Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open...
Oracle Solaris 11: First Look
A sneak peek at all the important new features and functionality of Oracle Solaris 11
Master the new installation methods.
Learn about advanced network configuration.
Oracle Solaris provides innovative, built-in features that deliver...
The Blender Python API: Precision 3D Modeling and Add-on Development
Understand Blender's Python API to allow for precision 3D modeling and add-on development. Follow detailed guidance on how to create precise geometries, complex texture mappings, optimized renderings, and much more.
This book is a detailed, user-friendly guide to understanding and using Blender’s Python API for...
The Effective Incident Response Team
When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...
Python for Unix and Linux System Administration Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them.
Each chapter in Python for Unix and...
|Result Page: 38 37 36 35 34 33 32 31 30 29 |