Android Hacker's Handbook

Android Hacker’s Handbook

(1 reviews, 309 downloads)
, 2014-03-31, 576 pages, pdf, epub
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the…
Mastering System Center 2012 R2 Configuration Manager

Mastering System Center 2012 R2 Configuration Manager

(1 reviews, 354 downloads)
, 2014-03-10, 936 pages, pdf, epub
Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product, including planning and installation, migrating…
The Hacker Playbook: Practical Guide To Penetration Testing

The Hacker Playbook: Practical Guide To Penetration Testing

(10 reviews, 973 downloads)
, 2014-03-13, 294 pages, pdf, epub
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional…
Todd Lammle's CCNA/CCENT IOS Commands Survival Guide, 2nd Edition

Todd Lammle’s CCNA/CCENT IOS Commands Survival Guide, 2nd Edition

(1 reviews, 671 downloads)
, 2014-02-24, 264 pages, pdf, epub
Todd Lammle’s CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120 Your Guide to CCENT and CCNA IOS Commands This book is an ideal supplement to Todd Lammle’s CCENT and CCNA Study Guides, and a great quick reference for…
Cryptography and Network Security: Principles and Practice, 6th Edition

Cryptography and Network Security: Principles and Practice, 6th Edition

(6 reviews, 869 downloads)
, 2013-03-16, 752 pages, pdf, epub
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and…