Chapter 1: Common Web Applications and Architectures; Common architectures; Standalone models; Three-tier models; Model-View-Controller design; Web application hosting; Physical hosting; Virtual hosting; Clo...
Kali Linux Wireless Penetration Testing: Beginner's Guide
Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells historys most fascinating story of deception and cunning: the science of cryptography--the encoding and decod...
A project-based approach to learning Python programming for beginners. Intriguing projects teach you how to tackle challenging problems with code.
With its emphasis on project-based practice,...
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment
Hacking Connected Cars deconstructs the tactics, t...
"Four pals clean up in Vegas with a pocket-sized computer. A bored Canadian teen gains access to the wire transfers section of a major Southern bank. A couple of kids are recruited to hack into Lockheed...
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? . This easy guide will help transf...
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to th...
Enter your address and we will specify the offer for your area.