Ubuntu using hacking

Ubuntu using hacking

The name of this book is Ubuntu Ushing Hacking. This book write is a Indian author Meet Chauhan. With the...

Cyber Insecurity

Cyber Insecurity

Cyber security is a completely man made phenomenon, which has become the most complex threat to modern societies and disruptor...

Personal Cybersecurity

Personal Cybersecurity

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the...

Real-Time Embedded Systems

Real-Time Embedded Systems

Offering comprehensive coverage of the convergence of real-time embedded systems scheduling, resource access control, software design and development, and high-level...

DNS Security Management

DNS Security Management

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and...

Agile Application Security

Agile Application Security

As the fastest growing, most commonly adopted development lifecycle, agile software development enables organizations to react quickly to rapidly changing...