Category: Computer Security

Gray Hat Python

Gray Hat Python

stars

Python is fast becoming the programming language of choice for…
Programming with STM32: Getting Started with the Nucleo Board and C/C++

Programming with STM32: Getting Started with the Nucleo Board and C/C++

stars

Create your own STM32 programs with ease! Get up and…
CCNA Security (210-260) Portable Command Guide

CCNA Security (210-260) Portable Command Guide

stars

Preparing for the latest CCNA Security exam? Here are all…
Introduction to Number Theory

Introduction to Number Theory

stars

One of the oldest branches of mathematics, number theory is…
Threat Assessment and Management Strategies : Identifying the Howlers and Hunters, Second Edition

Threat Assessment and Management Strategies

stars

The field of threat assessment and the research surrounding it…
Windows Security Monitoring : Scenarios and Patterns

Windows Security Monitoring

stars

Dig deep into the Windows auditing subsystem to monitor for…
Digital Forensics Explained

Digital Forensics Explained

stars

The field of computer forensics has experienced significant growth recently…
CEH Certified Ethical Hacker Bundle, Third Edition

CEH Certified Ethical Hacker Bundle, Third Edition

stars

Fully revised for the CEH v9 exam objectives, this valuable…
Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

stars

Google is the most popular search engine ever created, but…
Computer Forensics JumpStart

Computer Forensics JumpStart

stars

Essential reading for launching a career in computer forensics Internet…
Copyright © 2019 My WordPress Website. Just another WordPress site