Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
Au catalogue depuis le: 20.05.2021
Disponible
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
Au catalogue depuis le: 20.05.2021
Disponible
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
Mevcuda giriş tarihi 20.05.2021
Disponible
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
Mevcuda giriş tarihi 20.05.2021
Disponible
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
Mevcuda giriş tarihi 20.05.2021
Disponible
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
Mevcuda giriş tarihi 20.05.2021
Disponible
The security required for cloud deployments is quite different from the security applied to on-site ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
Mevcuda giriş tarihi 20.05.2021
Disponible
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
Mevcuda giriş tarihi 20.05.2021
Disponible
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
Mevcuda giriş tarihi 20.05.2021
Disponible
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
en la colección desde: 20.05.2021
Disponible