Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead …
Create a complete continuous delivery process using modern DevOps tools such as Docker, Jenkins, Kubernetes, Ansible, Terraform, and many moreKey …
Марк Руссинович пишет об устройстве современных серверных и настольных ОС - от реестра и API к аналицу ошибок и устранению …
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer …
Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from …
DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security …
The perfect study guide to help you pass CompTIA®s new A+® Core 1: 220-1001 and Core 2: 220-1002 exams. It …
* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * …
As the 'network is the computer' slogan becomes reality so reliability and security of networked applications become more important. Not …
* Offers fifty practical and secure PHP applications that readers can immediately put to use* Explains the entire life cycle …
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced …
If you are willing to search around the internet for the same info, you will most likely find it. I …
All the info needed to build your own heavy weapons and explosives is now under one cover. Includes reprinted material …
An example-driven approach to securing Oracle APEX applicationsAs a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to …
If you're a current or aspiring Windows administrator or consultant, look no further than Mastering Windows Server 2003 for the …
Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapyKey FeaturesEnhance your Python programming skills …
Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in …
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and …
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations …
Uncover hidden patterns of data and respond with countermeasuresSecurity professionals need all the tools at their disposal to increase their …
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat …
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography―the science of sending secret messages. …
Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control addresses the basic theory, architectures, and technologies that are necessary …
This book constitutes the refereed proceedings of the 16th Conference on Computer Networks, CN 2009, held in Wisla, Poland, in …
Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that …
This timely revision of one of the all time best-selling Data Communications and Networking book features the clarity and scope …
A broad introductory text written for computer scientists and engineers, focusing on the fundamental aspects of data communications and computer …
This timely revision of an all-time best-seller in the field features the clarity and scope of a Stallings classic. This …
Data communications and computer networks are becoming increasingly more important--today's business world could not function without either. DATABASE COMMUNICATIONS AND …
If you're setting up a network at home or creating and managing one for business, there are dozens of things …
If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as …
I teach Professional Selling at the University of New Mexico and publish a list of local networking mixers, events, etc. …