Watch movie | Design et Graphisme | Taken (2017) Saison 2 Streaming
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Oracle Solaris 11: First Look
Oracle Solaris 11: First Look

A sneak peek at all the important new features and functionality of Oracle Solaris 11

Overview

  • Master the new installation methods.
  • Learn about advanced network configuration.

In Detail

Oracle Solaris provides innovative, built-in features that deliver...

Mastering Concurrency Programming with Java 8
Mastering Concurrency Programming with Java 8

Master the principles and techniques of multithreaded programming with the Java 8 Concurrency API

About This Book

  • Implement concurrent applications using the Java 8 Concurrency API and its new components
  • Improve the performance of your applications or process more data at the same time,...
Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks
Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks

Learn how to build web applications from three Microsoft MVPs. After building the data application layer using Entity Framework Core and a RESTful service using ASP.NET Core, you will then build the client side web application three ways: first, using ASP.NET Core, then using Angular 2, and, finally, using React.  You will be...

Beginning Apache Cassandra Development
Beginning Apache Cassandra Development

Beginning Apache Cassandra Development introduces you to one of the most robust and best-performing NoSQL database platforms on the planet. Apache Cassandra is a document database following the JSON document model. It is specifically designed to manage large amounts of data across many commodity servers without there being any single...

Sams Teach Yourself TCP/IP in 24 Hours (5th Edition) (Sams Teach Yourself -- Hours)
Sams Teach Yourself TCP/IP in 24 Hours (5th Edition) (Sams Teach Yourself -- Hours)

 

Welcome to Sams Teach Yourself TCP/IP in 24 Hours, Fifth Edition. This book provides a clear and concise introduction to TCP/IP for newcomers, and also for users who have worked with TCP/IP but would like a little more of the inside story. Unlike other networking primers that point and click
...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything

Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book.

Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal...

The Blender Python API: Precision 3D Modeling and Add-on Development
The Blender Python API: Precision 3D Modeling and Add-on Development

Understand Blender's Python API to allow for precision 3D modeling and add-on development. Follow detailed guidance on how to create precise geometries, complex texture mappings, optimized renderings, and much more.

This book is a detailed, user-friendly guide to understanding and using Blender’s Python API for...

The Effective Incident Response Team
The Effective Incident Response Team

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...

Python for Unix and Linux System Administration
Python for Unix and Linux System Administration
Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them.

Each chapter in Python for Unix and
...
Result Page: 38 37 36 35 34 33 32 31 30 29 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy