Developing graphical user interfaces (GUIs) in Python traditionally involves a lot of manual coding. ...
In stock since: 20.05.2021
Available
The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsider ...
In stock since: 20.05.2021
Available
Despite the arrival of myriad new and modern languages, COBOL still rules many government and legacy ...
In stock since: 20.05.2021
Available
Kali Linux is targeted at digital forensics experts and penetration testers. It includes over 400 pe ...
In stock since: 20.05.2021
Available
Enumeration is designed for ethical hackers who want to build their skills in reconnaissance of targ ...
In stock since: 20.05.2021
Available
You've secured your systems, trained your users, and fortified your network. Think you're ready to h ...
In stock since: 20.05.2021
Available
Pen testing is a standard technique for on-site systems, but the way testing is carried out in the c ...
In stock since: 20.05.2021
Available
More and more companies are migrating their applications and infrastructure to the cloud, shifting o ...
In stock since: 20.05.2021
Available
In this course, instructor Malcolm Shore offers you a hands-on introduction to programming in both t ...
In stock since: 20.05.2021
Available
The security required for cloud deployments is quite different from the security applied to on-site ...
Mevcuda giriş tarihi 20.05.2021
Available
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threat ...
Mevcuda giriş tarihi 20.05.2021
Available
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest to ...
Mevcuda giriş tarihi 20.05.2021
Available
Set a rock-solid foundation for your network, users, and data by learning about the basics of cybers ...
Mevcuda giriş tarihi 20.05.2021
Available
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for sc ...
Mevcuda giriş tarihi 20.05.2021
Available
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, ...
In stock since: 20.05.2021
Available
Ethical hacking is one of the most desired stills for any IT security professional. White hat hacker ...
Au catalogue depuis le: 20.05.2021
Available
Enumeration is the key to achieving success with penetration testing, and learning how to do it effe ...
Im Bestand seit: 20.05.2021
Available
Websites and web applications are-by their very nature-accessible remotely, which puts them at high ...
Im Bestand seit: 20.05.2021
Available
Bolster your penetration testing skillset by learning three advanced techniques: tunneling, pivoting ...
Im Bestand seit: 20.05.2021
Available
The key to effectively protecting your systems is understanding the attacks you have to defend them ...
en la colección desde: 20.05.2021
Available