Pages : | 45 |
Size : | 2.6 MB |
File type : | |
Downloads: | 69 |
Created: | 2022-02-02 |
License: | CC BY |
Author(s): | Alec Warner, Vitaliy Shipitsyn, Carmela Quinito |
This pdf tutorial discusses the advantages and disadvantages of using VoIP services, focusing primarily on security issues that may affect those who are new to VoIP....
Security Infrastructure Technology for Integrated Utilization of Big DataDownload free course Security Infrastructure Technology for Integrated Utilization of Big Data, pdf file on 171 pages by Atsuko Miyaji, Tomoaki Mimoto....
Autonomous Control for a Reliable Internet of ServicesDownload free course Autonomous Control for a Reliable Internet of Services, pdf file on 416 pages by by Ivan Ganchev, R. van der Mei, Hans van den Berg....
Computer Networking : Principles, Protocols and PracticeThis is an ongoing effort to develop an open-source networking textbook that could be used for an in-depth undergraduate or graduate networking courses. ...
Introduction to Ethical HackingDownload Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....
Hacking the XboxDownload free course Hacking the Xbox, pdf file on 291 pages by Andrew Huang....
Rational Cybersecurity for BusinessDownload free course Rational Cybersecurity for Business, pdf file on 349 pages by Dan Blum....
WLAN network basicsDownload free WLAN network basics Systems (example:802.11 WLAN Systems) course material, tutorial training, a PDF file under 53 pages by veriwave....
Writing Native Mobile Apps in a Functional Language SuccinctlyDownload free course Writing Native Mobile Apps in a Functional Language Succinctly, pdf file on 129 pages by Vassili Kaplan....
Secrets of Network Cartography: A Comprehensive Guide to NmapEver wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...