CEH v9: Certified Ethical Hacker Version 9 Study Guide
The ultimate preparation guide for the unique CEH exam.
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
Master CEH v9 and identify your weak spots
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...
Linux Server Security: Hack and Defend
Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server...
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...
Kali Linux CTF Blueprints
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
About This Book
Put the skills of the experts to the test with these tough and customisable pentesting projects
Develop each challenge to suit your specific...
Practical Linux Security Cookbook
This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
Enhance file system security and local and remote
|Result Page: 49 48 47 46 45 44 43 42 41 40 |