Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...
Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
Become an expert in cracking WiFi...
Wireless A to Z THE MOST PRECISE, CONCISE, AND AUTHORITATIVE WIRELESS REFERENCE AVAILABLE!
In today’s information-rich environment, a business operating without a cogent wireless communications strategy is destined for failure. That’s why, if designing, maintaining, or upgrading wireless and mobile communications systems...
Mac Hacks: Tips & Tools for unlocking the power of OS X
Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them...
Ultra-Wideband Wireless Communications and Networks Ultra-wideband (UWB) technology has great potential for applications in wireless communications, radar and location. It has many benefits due to its ultra-wideband nature, which include high data rate, less path loss and better immunity to multipath propagation, availability of low-cost transceivers, low transmit power and low interference. Despite... WiMAX Networks: Techno-Economic Vision and Challenges
Ignited by the mobile phone's huge success at the end of last century, the demand for wireless services is constantly growing. To face this demand, wireless systems have been and are deployed at a large scale. These include mobility-oriented technologies such as GPRS, CDMA or UMTS, and Local Area Network-oriented technologies such as...
More iPhone Development with Swift: Exploring the iOS SDK
Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)
Data and Computer Communications (8th Edition)
This book attempts to provide a unified overview of the broad field of data and computer communications.
The organization of the book reflects an attempt to break this massive subject
into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book
iPad All-in-One For Dummies
Slate-style computers have been around for a few years, but it took
Apple to make them catch on with the general public in a big way when
it introduced the iPad. This small, less than a pound-and-a-half wonder has
sold millions of units in its first year for good reason: It’s well designed,
feature rich, and opens up a world of...
|Result Page: 8 7 6 5 4 3 2 1 |