Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
In stock since: 20.05.2021
Available
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
In stock since: 20.05.2021
Available
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
In stock since: 20.05.2021
Available
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
In stock since: 20.05.2021
Available
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
In stock since: 20.05.2021
Available
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
In stock since: 20.05.2021
Available
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
In stock since: 20.05.2021
Available
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
In stock since: 20.05.2021
Available
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
In stock since: 20.05.2021
Available
The security required for cloud deployments is quite different from the security applied to on-site ...
In stock since: 20.05.2021
Available
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
In stock since: 20.05.2021
Available
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
In stock since: 20.05.2021
Available
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
In stock since: 20.05.2021
Available
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
In stock since: 20.05.2021
Available
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
In stock since: 20.05.2021
Available
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
In stock since: 20.05.2021
Available
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
In stock since: 20.05.2021
Available
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
In stock since: 20.05.2021
Available
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
In stock since: 20.05.2021
Available
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
In stock since: 20.05.2021
Available