Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Network Hacks: Attack and Defense with Python

Buy

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

(HTML tags aren't allowed.)

Beginning XSLT and XPath: Transforming XML Documents and Data (Wrox Programmer to Programmer)
Beginning XSLT and XPath: Transforming XML Documents and Data (Wrox Programmer to Programmer)
Provides the basic education in the XSLT processing model that developers have requested

The growth of XML content management applications is boosting the demand for XSLT and XPath skills. This beginning Wrox book provides a firm foundation in the XSLT processing model, giving developers an important skillset.

...

101 Smart Questions to Ask on Your Interview
101 Smart Questions to Ask on Your Interview

This book is for every job candidate who thinks "Do you have any questions for me?" marks the end of an interview. It doesn't. In fact, it marks the beginning of the last and perhaps most important interview phase - a phase so important that failing to prepare properly for it can undo all your hard work, including providing...

Resumes For Dummies
Resumes For Dummies

Write a winning resume and land that job interview!

Is your job search stalling out after you submit a resume but before you're offered an interview? With a recession that has caused a 10% unemployment rate affecting 15.3 million Americans, having a winning resume is vital to securing an interview-and it demands a fresh look at...


Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Physics of Space Storms: From the Solar Surface to the Earth
Physics of Space Storms: From the Solar Surface to the Earth

This unique , authoritative book introduces and accurately depicts the current state-of-the art in the field of space storms. Professor Koskinen, renowned expert in the field, takes the basic understanding of the system, together with the pyhsics of space plasmas, and produces a treatment of space storms. He combines a solid base describing...

Microsoft Office 2007: Introductory Concepts and Techniques, Premium Video Edition (Shelly Cashman)
Microsoft Office 2007: Introductory Concepts and Techniques, Premium Video Edition (Shelly Cashman)

The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our series of Microsoft Offi ce 4.3, Microsoft Offi ce 95, Microsoft Offi ce 97, Microsoft Offi ce 2000, Microsoft Offi ce XP, Microsoft Offi ce 2003, and Microsoft Offi ce 2007 textbooks have been the most widely used books...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy