Konkiki No Gash Bell | Kuroko No Basuke | Last Exile
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)
Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)

Whether you need a new tool or just inspiration, Seven Web Frameworks in Seven Weeks explores modern options, giving you a taste of each with ideas that will help you create better apps. You'll see frameworks that leverage modern programming languages, employ unique architectures, live client-side instead of server-side, or embrace...

Red Hat Enterprise Linux Server Cookbook
Red Hat Enterprise Linux Server Cookbook

Key Features

  • Create fully unattended installations and deploy configurations without breaking a sweat
  • Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
  • Be guided by an experienced RHEL...
Introducing Linux Distros
Introducing Linux Distros

Learn the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon installation guides....

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
CentOS 6 Linux Server Cookbook
CentOS 6 Linux Server Cookbook

An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.

  • Delivering comprehensive insight into CentOS server with a series of starting points that show you...
Mastering Apache Spark
Mastering Apache Spark

Gain expertise in processing and storing data by using advanced techniques with Apache Spark

About This Book

  • Explore the integration of Apache Spark with third party applications such as H20, Databricks and Titan
  • Evaluate how Cassandra and Hbase can be used for storage
  • An...
Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Docker Bootcamp
Docker Bootcamp

Fast, intensive, and effective Docker learning

About This Book

  • Get well-versed with Docker in 7 days
  • Identify and resolve common problems faced by users while working with Docker
  • A fast-paced guide that will focus on all the core Docker functionalities

...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Xamarin Mobile Development for Android Cookbook
Xamarin Mobile Development for Android Cookbook

Over 80 hands-on recipes to unleash full potential for Xamarin in development and monetization of feature-packed, real-world Android apps

About This Book

  • Create a number of Android applications using the Xamarin Android platform
  • Extensively integrate your Android devices with other...
Result Page: 113 112 111 110 109 108 107 106 105 104 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy