Life Of The Party | Dallas 2012 | KissXsis
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Building Probabilistic Graphical Models with Python
Building Probabilistic Graphical Models with Python

Solve machine learning problems using probabilistic graphical models implemented in Python with real-world applications

About This Book

  • Stretch the limits of machine learning by learning how graphical models provide an insight on particular problems, especially in high dimension areas such as image...
Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)
Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)

Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols,...

An Introduction to Network Programming with Java: Java 7 Compatible
An Introduction to Network Programming with Java: Java 7 Compatible

Since the second edition of this text, the use of the Internet and networks generally has continued to expand at a phenomenal rate. This has led to both an increase in demand for network software and to improvements in the technology used to run such networks, with the latter naturally leading to changes in the former. During this time, the...

Hacking For Dummies (For Dummies)
Hacking For Dummies (For Dummies)

Learn to hack your own system to protect against malicious attacks from outside

Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This...

Apache CloudStack Cloud Computing
Apache CloudStack Cloud Computing

Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.

Overview

  • Install, deploy, and manage a cloud service using...
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

CompTIA Linux+ Guide to Linux Certification (MindTap Course List)
CompTIA Linux+ Guide to Linux Certification (MindTap Course List)

Equip yourself with the most up-to-date information to pass CompTIA's Linux+ (Powered by LPI) Certification exam successfully and excel when using Linux in today's business world with Eckert's LINUX+ GUIDE TO LINUX CERTIFICATION, 4E. This complete guide provides the solid conceptual foundation and mastery of hands-on skills...

Building a BeagleBone Black Super Cluster
Building a BeagleBone Black Super Cluster

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This Book

  • Configure your own cluster for high speed parallel computing
  • Benefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable...
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Result Page: 346 345 344 343 342 341 340 339 338 337 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy