- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Assembly language: Step by step - Jeff Duntemann
Ebook "Assembly language: Step by step" includes contents: Chapter 0 another pleasant valley saturday; chapter 1 alien bases; chapter 2 lifting the hood; chapter 3 the right to assemble; chapter 4 learning and using jed; chapters an uneasy alliance; chapter 6 following your instructions; chapter7 our object all sublime; chapter8 dividing and conquering; chapter 9 bits, flags, branches, and tables; chapter 10 stringing them up; chapter 11 o...
466 p actvn 24/04/2024 1 0
Từ khóa: Ebook Assembly language, Assembly Language, Computer programming, Lifting the hood, Using jed, Uneasy alliance, Arithmetic in Hex
Ebook The ethical hack - A framework for business value penetration testing
Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.
331 p actvn 24/04/2024 2 0
Từ khóa: The ethical hack, Computer networks, Security measures, Computer hackers, Business enterprises, Vulnerability analysis, Getting started, Setting the stage, the framework
Ebook Principles of computer architecture: Part 1
Part 1 book "Principles of computer architecture" includes content: Introduction, data representation, arithmetic, the instruction set architecture, languages and the machine, datapath and control.
274 p actvn 24/04/2024 1 0
Từ khóa: Principles of computer architecture, Data representation, The instruction set architecture, Languages and the machine, Datapath and control
Ebook 6502 assembly language subroutines
This book is intended to serve as a source and a reference for the assembly language programmer. It contains an overview of assembly language program- ming for a particular microprocessor and a collection of useful routines. In writing the routines, we have used a standard format, documentation package, and parameter passing techniques. We have followed the rules of the original manufacturer's assembler and have described the purpose,...
562 p actvn 24/04/2024 1 0
Từ khóa: 6502 assembly language subroutines, Computer programming, The assembly language programmer, Implementing Additional Instructions, Addressing Modes, Common programming errors, Introduction to program section
Ebook Managing Cisco network security: Part 1
Ebook Managing Cisco network security: Part 1 includes contents: Chapter 1 introduction to IP network security, chapter 2 traffic filtering on the Cisco IOS, chapter 3 network address translation (NAT), chapter 4 Cisco PIX Firewall, chapter 5 virtual private networks.
257 p actvn 26/03/2024 30 0
Từ khóa: Ebook Managing Cisco network security, Managing Cisco network security, Network security, Computer security, Information security, IP network security, The Cisco IOS
Ebook How to cheat at securing a wireless network: Part 1
Ebook How to cheat at securing a wireless network - Part 1 includes contents: Chapter 1: introduction to wireless: from past to present, chapter 2: wireless security, chapter 3: dangers of wireless devices in the workplace, chapter 4: WLAN rogue access point detection and mitigation, chapter 5: wireless LAN VLANs, chapter 6: designing a wireless network, chapter 7: wireless network architecture and design.
286 p actvn 26/03/2024 15 0
Từ khóa: Network security, Computer security, Information security, Wireless network, Wireless security, Dangers of wireless devices in the workplace, Wireless LAN VLANs
Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to...
134 p actvn 26/03/2024 21 0
Từ khóa: Network security, Computer security, Information security, Computer hacking, Security testing, The Hacker's methodology
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1 includes contents: Chapter 1: computer forensics in today’s world; chapter 2: systems, disks, and media; chapter 3: the computer investigation process; chapter 4: acquiring data, duplicating data, and recovering deleted files; chapter 5: Windows, Linux, and macintosh boot processes; chapter 6: Windows and Linux Forensics; chapter 7: steganography and...
485 p actvn 26/03/2024 9 0
Từ khóa: The official CHFI, Computer hacking forensics investigators, Computer hacking, Computer forensics, Linux Forensics, Application password crackers
Đăng nhập
Bộ sưu tập nổi bật
10 19594
Bộ sưu tập Tài liệu học tiếng Anh
14 82964
12 23564
Bộ sưu tập Kỹ thuật viễn thông
11 16531