Botswana | John Aalborg | 31.05.1807:49 Uhr Vaporum*inklusive deutschem Untertitel* Action0 / 0309 Hits VID P2P DDL 0 Kommentare
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Pro SQL Database for Windows Azure: SQL Server in the Cloud
Pro SQL Database for Windows Azure: SQL Server in the Cloud

Pro SQL Database for Windows Azure, 2nd Edition shows how to create enterprise-level database deployments without the usual investment in datacenter and other infrastructure. Take advantage instead of Microsoft’s worldwide backbone for cloud computing that delivers all the power of SQL Server in the form of the cloud-based...

The Effective Incident Response Team
The Effective Incident Response Team

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...

Introduction to Numerical Geodynamic Modelling
Introduction to Numerical Geodynamic Modelling

Numerical modelling of geodynamic processes was predominantly the domain of high-level mathematicians experienced in numerical and computational techniques. Now, for the first time, students and new researchers in the Earth Sciences can learn the basic theory and applications from a single, accessible reference text. Assuming only minimal...

Practical Oracle Database Appliance
Practical Oracle Database Appliance

Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration.  Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various...

Machine Learning and Data Mining for Computer Security: Methods and Applications
Machine Learning and Data Mining for Computer Security: Methods and Applications

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the...

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy