Browse Results

Showing 44,301 through 44,325 of 64,277 results

Pedagogy of Tele-Proximity for eLearning: Bridging the Distance with Social Physics (Routledge Research in Digital Education and Educational Technology)

by Chryssa Themelis

This book examines networked science and the pedagogy of tele-proximity, a paradigm that integrates eLearning theories, information technology and visual media competencies. The book conceptualises the idea of tele-proximity as a means to foster diversity and human to human contact online. It uses the lens of social physics and considers how to bridge the distance in eLearning, examining social connections, collective intelligence and personal wellbeing. The book draws on qualitative and quantitative research in higher education to form fine-tuned eLearning networks that achieve demosophia, the core of democracy. It charts the progress of technology-enhanced learning approaches and shows the need for a sound pedagogical framework that is holistic and sustainable to promote mindful presence. Contributing to the literature on eLearning, this timely book will be of great interest to educational philosophers, policy makers, educators, researchers and students in the field of distance education.

Pediatric Biomedical Informatics

by John J. Hutton

Advances in the biomedical sciences, especially genomics, proteomics, and metabolomics, taken together with the expanding use of electronic health records, are radically changing the IT infrastructure and software applications needed to support the transfer of knowledge from bench to bedside. Pediatric Biomedical Informatics: Computer Applications in Pediatric Research describes the core resources in informatics necessary to support biomedical research programs and how these can best be integrated with hospital systems to receive clinical information that is necessary to conduct translational research.The focus is on the authors' recent practical experiences in establishing an informatics infrastructure in a large research-intensive children's hospital. This book is intended for translational researchers and informaticians in pediatrics, but can also serve as a guide to all institutions facing the challenges of developing and strengthening informatics support for biomedical research. The first section of the book discusses important technical challenges underlying computer-based pediatric research, while subsequent sections discuss informatics applications that support biobanking and a broad range of research programs. Pediatric Biomedical Informatics provides practical insights into the design, implementation, and utilization of informatics infrastructures to optimize care and research to benefit children. Dr. John Hutton is the Vice President and Director of Biomedical Informatics at Cincinnati Children's Hospital Medical Center, Cincinnati, OH, USA. He is also Professor of Pediatrics and Associate Dean for Information Services at the University of Cincinnati College of Medicine.

Pediatric Neuro-Ophthalmology

by Michael C. Brodsky

"Due to the generous representation of the afferent visual system within the brain, neurological disease may disrupt vision as a presenting symptom or as a secondary effect of the disease. Conversely, early developmental disturbances of vision often disrupt ocular motor control systems, giving rise to complex disorders such as nystagmus, strabismus, and torticollis. The signs and symptoms of neurological disease are elusive by their very nature, presenting a confounding diagnostic challenge. Neurological medications and neurosurgical treatments can produce neuro-ophthalmological dysfunction that can be difficult to distinguish from disease progression. Affected patients may experience substantial delays in diagnosis, and are often subjected to extensive (and expensive) diagnostic testing. Scientific articles pertaining to specific disorders are scattered throughout medical subspecialty journals. These children continue to "fall through the cracks" of our medical education system. The increasing recognition that pediatric neuro-ophthalmology comprises a distinct set of diseases from those seen in adults has led to its emergence as a dedicated field of study. "Since the original publication of Pediatric Neuro-Ophthalmology nearly fourteen years ago, interest in the field has burgeoned. Pediatric ophthalmology and pediatric neurology subspecialty conferences often include symposia dedicated to recent advances in pediatric neuro-ophthalmology. Technical advances in neuroimaging have given rise to a more integrated mechanistic classification of neuro-ophthalmological disease in children. Our understanding of neurodevelopmental disorders of the visual system has expanded, longstanding monoliths have been dissembled into component parts, basic molecular mechanisms have taken center stage, and genetic underpinnings have become definitional. Evolutionary alterations can now be observed at the level of the gene, adding a new dimension to our understanding of disease pathogenesis. New classifications now encompass clinically disparate conditions. Descriptive definitions have been supplanted by mechanistic ones, and clinical definitions superseded by genetic ones. Our concept of disease pathogenesis has been revised and in some cases overturned. Bearing witness to these remarkable advancements has compelled me to enhance and expand the first edition of Pediatric Neuro-Ophthalmology into this new and revised one. "In the first edition of this book, our goal was to present the clinical characteristics, diagnostic evaluation, and therapeutic options for the common neuro-ophthalmologic disorders of childhood. In so doing, we designed the book to be provide a narrative journey through the thought processes involved in the clinical management of these disorders. In this edition, I have retained the basic narrative format of original book, while expanding the exploration of these complex visual disorders in the context of the many new scientific advancements and discoveries that have come to light. These conditions are fun to diagnose, fascinating to understand, and gratifying to manage." --from the Preface to the 2nd Edition.

Pediatric and Lifespan Data Science: First International Conference, IPLDSC 2024, Anaheim, CA, USA, May 23–24, 2024, Revised Selected Papers (Communications in Computer and Information Science #2386)

by Mark Hoffman Louis Ehwerhemuepha Adam Kalawi Terence Sanger

This open access book will address the unique requirements and technological tools for analysis of data across the lifespan, from childhood through advanced age. Topics such as sepsis, hospital-acquired infections, mental health, health equity, precision medicine, large language models and generative artificial intelligence, computer vision, ethical use of artificial intelligence, and large real-world electronic health record databases will be covered.

Peer Pedagogies on Digital Platforms: Learning with Minecraft Let's Play Videos (Learning in Large-Scale Environments)

by Michael Dezuanni

How a popular entertainment genre on YouTube--Let's Play videos created by Minecraft players--offers opportunities for children to learn from their peers.Every day millions of children around the world watch video gameplay on YouTube in the form of a popular entertainment genre known as Let's Play videos. These videos, which present a player's gameplay and commentary, offer children opportunities for interaction and learning not available in traditional television viewing or solo video gameplay. In this book, Michael Dezuanni examines why Let's Play videos are so appealing to children, looking in particular at videos of Minecraft gameplay. He finds that a significant aspect of the popularity of these videos is the opportunity for knowledge and skill exchange.

Peer to Peer

by Rael Dornfest David Anderson Nimisha Asthagiri Dan Brickley Dan Bricklin Alan Brown Avinash Chugh Lorrie Cranor Roger Dingledine Michael Freedman Marc Hedlund Theodore Hong Gene Kan Adam Langley Richard Lethin Jeremie Miller Nelson Minar David Molnar Tim O'Reilly Aviel Rubin Clay Shirky Walter Tuvell Jon Udell Marc Waldman Brandon Wiley

This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. The contributors are leading developers of well-known peer-to-peer systems, such as Gnutella, Freenet, Jabber, Popular Power, SETI@Home, Red Rover, Publius, Free Haven, Groove Networks, and Reputation Technologies. Topics include metadata, performance, trust, resource allocation, reputation, security, and gateways between systems.

Peer-To-Peer: Harnessing the Benefits of a Disruptive Technology (First Edition)

by Andy Oram

This book is about the goals of peer-to-peer computer networking, its problems and solutions.

Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges (Chapman & Hall/CRC Computational Science)

by Yu-Kwong Ricky Kwok

While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges provides comprehensive theoretical and p

Peer-to-Peer: Harnessing the Power of Disruptive Technologies

by Andy Oram

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users.While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it.This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field:Nelson Minar and Marc Hedlund of target="new">Popular Power, on a history of peer-to-peerClay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headedTim O'Reilly of O'Reilly & Associates, on redefining the public's perceptionsDan Bricklin, cocreator of Visicalc, on harvesting information from end-usersDavid Anderson of SETI@home, on how SETI@Home created the world's largest computerJeremie Miller of Jabber, on the Internet as a collection of conversationsGene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologiesAdam Langley of Freenet, on Freenet's present and upcoming architectureAlan Brown of Red Rover, on a deliberately low-tech content distribution systemMarc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systemsRoger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systemsRael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadataTheodore Hong of Freenet, on performanceRichard Lethin of Reputation Technologies, on how reputation can be built onlineJon Udell ofBYTE and

Pen Testing from Contract to Report

by Alfred Basta Nadine Basta Waqar Anwar

Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.

Penetration Tester werden für Dummies (Für Dummies)

by Robert Shimonski

Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbst Pentests durchzuführen. Von den nötigen Vorbereitungen über Risikoanalyse und rechtliche Belange bis hin zur eigentlichen Durchführung und späteren Auswertung ist alles dabei. Versetzen Sie sich in Hacker hinein und lernen Sie, wo Unternehmen angreifbar sind. Werden Sie selbst zum Penetration Tester.

Penetration Tester's Open Source Toolkit

by Haroon Meer Keith Butler Chris Hurley Aaron Bayles Adair Collins Eoin Miller Gareth Phillips Jeremy Faircloth

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. <P><P>This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

Penetration Tester's Open Source Toolkit

by Jeremy Faircloth

<p>Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. <p>Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.</p>

Penetration Testing

by Kevin M. Henry

Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting. Special attention is also paid to new technologies that improve business operations, but which can create new vulnerabilities, such as employee remote access, wireless communications and public-facing web applications. This book will give you a better understanding of how to conduct a penetration test, and also how to deliver a client-focused report that assesses the security of the system and whether the level of risk to the organization is within acceptable levels. Kevin Henry has 35 years' experience working on computer systems, initially as a computer operator, and then in various programmer and analyst roles, before moving into audit and security. Kevin currently provides security auditing, training and educational programs for major clients and governments around the world and is a frequent speaker on the security conference circuit. A business-aligned approach to penetration testing!

Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

by Charles Horton David Okeyode Karl Fosaaen

Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breachesKey FeaturesUnderstand the different Azure attack techniques and methodologies used by hackersFind out how you can ensure end-to-end cybersecurity in the Azure ecosystemDiscover various tools and techniques to perform successful penetration tests on your Azure infrastructureBook DescriptionSecurity professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. The book provides a hands-on approach to exploring Azure penetration testing methodologies that will help you get up and running in no time with the help of a variety of real-world examples, scripts, and ready-to-use source code. As you learn about the Microsoft Azure platform and understand how hackers can attack resources hosted in the Azure cloud, you'll find out how to protect your environment by identifying vulnerabilities, along with extending your pentesting tools and capabilities. This book starts by taking you through the prerequisites for pentesting Azure and shows you how to set up a pentesting lab. You'll then simulate attacks on Azure assets such as web applications and virtual machines from anonymous and authenticated perspectives. Finally, you'll learn about the opportunities for privilege escalation in Azure tenants and ways in which an attacker can create persistent access to an environment. By the end of this book, you'll be able to leverage your ethical hacking skills to identify and implement different tools and techniques to perform successful penetration tests on your own Azure infrastructure.What you will learnIdentify how administrators misconfigure Azure services, leaving them open to exploitationUnderstand how to detect cloud infrastructure, service, and application misconfigurationsExplore processes and techniques for exploiting common Azure security issuesUse on-premises networks to pivot and escalate access within AzureDiagnose gaps and weaknesses in Azure security implementationsUnderstand how attackers can escalate privileges in Azure ADWho this book is forThis book is for new and experienced infosec enthusiasts who want to learn how to simulate real-world Azure attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches. Any technology professional working with the Azure platform (including Azure administrators, developers, and DevOps engineers) interested in learning how attackers exploit vulnerabilities in Azure hosted infrastructure, applications, and services will find this book useful.

Penetration Testing Bootcamp

by Jason Beltrame

Sharpen your pentesting skill in a bootcamp About This Book • Get practical demonstrations with in-depth explanations of complex security-related problems • Familiarize yourself with the most common web vulnerabilities • Get step-by-step guidance on managing testing results and reporting Who This Book Is For This book is for IT security enthusiasts and administrators who want to understand penetration testing quickly. What You Will Learn • Perform different attacks such as MiTM, and bypassing SSL encryption • Crack passwords and wireless network keys with brute-forcing and wordlists • Test web applications for vulnerabilities • Use the Metasploit Framework to launch exploits and write your own Metasploit modules • Recover lost files, investigate successful hacks, and discover hidden data • Write organized and effective penetration testing reports In Detail Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to scan for vulnerabilities and Metasploit, learn how to setup connectivity to a C&C server and maintain that connectivity for your intelligence gathering as well as offsite processing. Using TCPDump filters, you will gain understanding of the sniffing and spoofing traffic. This book will also teach you the importance of clearing up the tracks you leave behind after the penetration test and will show you how to build a report from all the data obtained from the penetration test. In totality, this book will equip you with instructions through rigorous tasks, practical callouts, and assignments to reinforce your understanding of penetration testing. Style and approach This book is delivered in the form of a 10-day boot camp style book. The day-by-day approach will help you get to know everything about penetration testing, from the use of network reconnaissance tools, to the writing of custom zero-day buffer overflow exploits.

Penetration Testing Essentials

by Sean-Philip Oriyano

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before you get that experience, you need a basic understanding of the technical and behavioral ways attackers compromise security, and the tools and techniques you'll use to discover the weak spots before others do. You'll learn information gathering techniques, scanning and enumeration, how to target wireless networks, and much more as you build your pen tester skill set. You'll learn how to break in, look around, get out, and cover your tracks, all without ever being noticed. Pen testers are tremendously important to data security, so they need to be sharp and well-versed in technique, but they also need to work smarter than the average hacker. This book set you on the right path, with expert instruction from a veteran IT security expert with multiple security certifications. IT Security certifications have stringent requirements and demand a complex body of knowledge. This book lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set.

Penetration Testing Essentials

by Sean-Philip Oriyano

Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before you get that experience, you need a basic understanding of the technical and behavioral ways attackers compromise security, and the tools and techniques you'll use to discover the weak spots before others do. You'll learn information gathering techniques, scanning and enumeration, how to target wireless networks, and much more as you build your pen tester skill set. You'll learn how to break in, look around, get out, and cover your tracks, all without ever being noticed. Pen testers are tremendously important to data security, so they need to be sharp and well-versed in technique, but they also need to work smarter than the average hacker. This book set you on the right path, with expert instruction from a veteran IT security expert with multiple security certifications. IT Security certifications have stringent requirements and demand a complex body of knowledge. This book lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. Learn the fundamentals of security and cryptography Master breaking, entering, and maintaining access to a system Escape and evade detection while covering your tracks Build your pen testing lab and the essential toolbox Start developing the tools and mindset you need to become experienced in pen testing today.

Penetration Testing For Dummies

by Robert Shimonski

Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!

Penetration Testing with BackBox

by Stefan Umit Uygur

This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing.

Penetration Testing with Perl

by Douglas Berdeaux

If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience.

Penetration Testing with Raspberry Pi

by Joseph Muniz Aamir Lakhani

If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.

Penetration Testing with Raspberry Pi

by Joseph Muniz Aamir Lakhani

If you are looking for a low budget, small form-factor remotely accessible hacking tool, then the concepts in this book are ideal for you. If you are a penetration tester who wants to save on travel costs by placing a low-cost node on a target network, you will save thousands by using the methods covered in this book. You do not have to be a skilled hacker or programmer to use this book. It will be beneficial to have some networking experience; however, it is not required to follow the concepts covered in this book.

Penetration Testing with Raspberry Pi - Second Edition

by Jason Beltrame Michael Mcphee

Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book * Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 * Protect your confidential data by deftly preventing various network security attacks * Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire Who This Book Is For If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. Prior knowledge of networking and Linux would be an advantage. What You Will Learn * Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking * Learn how to store and offload pentest data from the Raspberry Pi 3 * Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques * Compromise systems using various exploits and tools using Kali Linux 2 * Bypass security defenses and remove data off a target network * Develop a command and control system to manage remotely placed Raspberry Pis * Turn a Raspberry Pi 3 into a honeypot to capture sensitive information In Detail This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You'll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you'll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0. Style and approach This concise and fast-paced guide will ensure you get hands-on with penetration testing right from the start. You will quickly install the powerful Kali Linux 2 on your Raspberry Pi 3 and then learn how to use and conduct fundamental penetration techniques and attacks.

Penetration Testing with Shellcode: Detect, Exploit, And Secure Network-level And Operating System Vulnerabilities

by Hamza Megahed

Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.

Refine Search

Showing 44,301 through 44,325 of 64,277 results