eBooks-it.org Logo
eBooks-IT.org Inner Image

Dec 15 2014 Added eBooks

Download free Dec 15 2014 Added eBooks

.NET Security and Cryptography

.NET Security and Cryptography Image
Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform - using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantial mathematical and theoretical background on the underlying cryptographic concepts. After reading this book and experimenting with the provided example programs, the reader should have a good understanding of the major cryptographic algorithms and standard cryptographic programming techniques. Readers should also gain a solid understanding of how .NET security ...

GED Test For Dummies

GED Test For Dummies Image
3rd Edition
Score higher on the GED with this easy-to-use guide Having undergone an extensive update in 2014, the current GED test covers a lot of ground. In today's job environment, earning a GED can give you an edge against the competition, whether it's to get a new job or advance in the one you already have. If you're preparing for this important exam, GED Test For Dummies, 3 rd Edition gets you up and running on everything you can expect on test day, from overviews of the test sections to invaluable reviews and test-taking strategies for all the subjects covered-and everything in between. Inside, you'll find hands-on, digestible information for navigating your...

Green Building Illustrated

Green Building Illustrated Image
"Green Building Illustrated is a must-read for students and professionals in the building industry. The combination of incredibly expressive illustrations and accessible technical writing make concepts of green building on paper as intuitive as they would be if you toured a space with experts in sustainable building." --Rick Fedrizzi, President, CEO, and Founding Chair of the U.S. Green Building Council "The authors of Green Building Illustrated deliver clear and intelligent text, augmented by straightforward but compelling illustrations describing green building basics. This comprehensive book covers everything from the definition of green building, to details of high performance design, to sensible applications of renewable energy. T...

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide Image
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to pe...

Python Forensics

A Workbench for Inventing And Sharing Digital Forensic Technology
Python Forensics Image
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical ...


2007 - 2017 © eBooks-IT.org