The Quest - Die Serie | VIDIO LAINNYA | Ronni Ancona
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Galaxy S5: The Missing Manual (Missing Manuals)
Galaxy S5: The Missing Manual (Missing Manuals)

Get the most out of Samsung’s Galaxy S5 smartphone right from the start. With clear instructions from technology expert Preston Gralla, this Missing Manual gives you a guided tour of Samsung's new flagship phone, including great new features such as the fingerprint scanner, heart rate sensor, and Download Booster....

Advanced Location-Based Technologies and Services
Advanced Location-Based Technologies and Services

Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive, and the demand for them will continue to grow. Exploring recent changes in the technology and its uses, Advanced Location-Based Technologies and Services takes an in-depth look at new and existing...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Kindle Paperwhite For Dummies
Kindle Paperwhite For Dummies

Rekindle your love of reading with Amazon's new Kindle Paperwhite and this fun and friendly guide

If you're the proud owner of a Kindle Paperwhite, you'll want to know all the best ways to get the very most out of it - and fast. That's where Kindle Paperwhite For Dummies comes in. This easy-to-follow...

Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Mac Hacks: Tips & Tools for unlocking the power of OS X
Mac Hacks: Tips & Tools for unlocking the power of OS X

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them...

More iPhone Development with Swift: Exploring the iOS SDK
More iPhone Development with Swift: Exploring the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)

The...

Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)

This book attempts to provide a unified overview of the broad field of data and computer communications. The organization of the book reflects an attempt to break this massive subject into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book emphasizes basic...

iPad All-in-One For Dummies
iPad All-in-One For Dummies

Slate-style computers have been around for a few years, but it took Apple to make them catch on with the general public in a big way when it introduced the iPad. This small, less than a pound-and-a-half wonder has sold millions of units in its first year for good reason: It’s well designed, feature rich, and opens up a world of...

Ultra-Wideband Wireless Communications and Networks
Ultra-Wideband Wireless Communications and Networks
Ultra-wideband (UWB) technology has great potential for applications in wireless communications, radar and location. It has many benefits due to its ultra-wideband nature, which include high data rate, less path loss and better immunity to multipath propagation, availability of low-cost transceivers, low transmit power and low interference. Despite...
Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy