Pages : | 291 |
Size : | 17.9 MB |
File type : | |
Downloads: | 213 |
Created: | 2022-02-02 |
License: | CC BY |
Author(s): | Andrew Huang |
Mind Hacking: How to Change Your Mind for Good in 21 Days
Download Hacking tutorial in PDF
Reverse Engineering for Beginners
This tutorial is about testing penetration and ethical hacking, designed to students. Free training document in PDF under 47 pages by Dr. Bruce V. Hartley....
Virtual Private Networks free tutorialDownload free pdf tutorial about Virtual Private Networks, document created by FEUP MPR under Creative commons license. A VPN is a secure tunnel (we can also speak of a virtual link) allowing communication between two entities, including over insecure networks such as the Internet....
IP Tunneling and VPNs TutorialThe objective of this course is to learn Virtual Private Network (VPN) fundamental and to overview tunneling techniques used for implementation of VPNs. Free pdf tutorial in PDF in 78 pages designed to beginners students....
Natural Language Processing SuccinctlyDownload free course Natural Language Processing Succinctly, pdf file on 93 pages by Joseph D. Booth....
An Introduction to Computer NetworksThis is a general-purpose textbook about computer networking, complete with diagrams and exercises. It is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, or as a supplemental text for a wide variety of network-related courses. ...
Guide to Computer Network Security, 4th EditionThis definitive text/reference on computer network and information security presents a com..., download free Network Security tutorial in PDF (572 pages) created by Joseph Migga Kizza ....
Language Technologies for the Challenges of the Digital AgeDownload free course Language Technologies for the Challenges of the Digital Age, pdf file on 315 pages by Georg Rehm, Thierry Declerck....
Secrets of Network Cartography: A Comprehensive Guide to NmapEver wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...
Managing Risk and Information SecurityDownload free course Managing Risk and Information Security, pdf file on 152 pages by Malcolm Harkins....
Introduction to Ethical HackingDownload Introduction to ethical hacking in PDF, training document under 12 pages intended to beginners....