Pages : | 488 |
Size : | 9.7 MB |
File type : | |
Downloads: | 160 |
Created: | 2022-02-02 |
License: | CC BY |
Author(s): | Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler |
How to become an Ethical Hacker
Building the Infrastructure for Cloud Security
Web Application Security for Dummies - Qualys Limited Edition
This tutorial is aimed to learn the fundamental of computer network, many questions and answers about the popular technology used for networking systems (wireless network, cellular communication, wap, bluetooth, wimax,..). Free pdf tutorial designed to beginners....
Security Infrastructure Technology for Integrated Utilization of Big DataDownload free course Security Infrastructure Technology for Integrated Utilization of Big Data, pdf file on 171 pages by Atsuko Miyaji, Tomoaki Mimoto....
Security in Computer and Information SciencesDownload free course Security in Computer and Information Sciences, pdf file on 169 pages by Erol Gelenbe, Paolo Campegiani, Tadeusz Czachórski, Sokratis Katsikas, Ioannis Komnios, Luigi Romano, Dimitrios Tzovaras....
Internet of ThingsDownload free course Internet of Things, pdf file on 235 pages by Leon Strous, Vinton Cerf....
WLAN network basicsDownload free WLAN network basics Systems (example:802.11 WLAN Systems) course material, tutorial training, a PDF file under 53 pages by veriwave....
Linux Network Administrators GuideThis tutorial provides a best reference for network administration in a Linux environment ,a complet training document under 505 pages for free download....
Writing Native Mobile Apps in a Functional Language SuccinctlyDownload free course Writing Native Mobile Apps in a Functional Language Succinctly, pdf file on 129 pages by Vassili Kaplan....
Internet FirewallDownload free Computer Networking : Firewall Internet Tutorial, training course material, a PDF file on 6 pages by Rob Pickering....
Computer Networks: A Systems ApproachThis book explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best selling and classic textbook explains various protocols and networking technologies. The systems oriented appro...
Rational Cybersecurity for BusinessDownload free course Rational Cybersecurity for Business, pdf file on 349 pages by Dan Blum....