Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
en la colección desde: 20.05.2021
disponible
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
en la colección desde: 20.05.2021
disponible
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
en la colección desde: 20.05.2021
disponible
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
en la colección desde: 20.05.2021
disponible
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
en la colección desde: 20.05.2021
disponible
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
en la colección desde: 20.05.2021
disponible
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
en la colección desde: 20.05.2021
disponible
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
en la colección desde: 20.05.2021
disponible
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
en la colección desde: 20.05.2021
disponible
The security required for cloud deployments is quite different from the security applied to on-site ...
en la colección desde: 20.05.2021
disponible
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
en la colección desde: 20.05.2021
disponible
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
en la colección desde: 20.05.2021
disponible
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
en la colección desde: 20.05.2021
disponible
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
en la colección desde: 20.05.2021
disponible
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
en la colección desde: 20.05.2021
disponible
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
en la colección desde: 20.05.2021
disponible
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
en la colección desde: 20.05.2021
disponible
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
en la colección desde: 20.05.2021
disponible
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
en la colección desde: 20.05.2021
disponible
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
en la colección desde: 20.05.2021
disponible