El gran showman (2017) | #LizaToo | • 12 Monkeys (Türkçe Dublaj) 6.7
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

C# 6 and .NET Core 1.0: Modern Cross-Platform Development
C# 6 and .NET Core 1.0: Modern Cross-Platform Development

The book has now been updated

About This Book

  • Build modern, cross-platform applications with .NET Core 1.0
  • Get up-to-speed with C#, and up-to-date with all the latest features of C# 6
  • Start creating professional web applications with ASP.NET Core 1.0

Who...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Oracle PL/SQL for DBAs
Oracle PL/SQL for DBAs

PL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between...

Voice Over IPv6: Architectures for Next Generation VoIP Networks
Voice Over IPv6: Architectures for Next Generation VoIP Networks
IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.

IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater
...
Windows Server 2012 R2 Inside Out Volume 1: Configuration, Storage, & Essentials
Windows Server 2012 R2 Inside Out Volume 1: Configuration, Storage, & Essentials

This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows Server 2012 R2 - with a focus on configuration, storage, and essential administrative tasks.

Coverage includes:

  • Deployment
  • Boot configuration
  • ...
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy