Pages : | 46 |
Size : | 1.5 MB |
File type : | |
Downloads: | 84 |
Created: | 2022-02-03 |
License: | CC BY |
Author(s): | Veracode |
Security Infrastructure Technology for Integrated Utilization of Big Data
Demystifying Internet of Things Security
Download free training tutorial in pdf about VoIP (Voice over IP),document in 46 pages designated to intermediate level-users....
Hacking PortugalDownload free course Hacking Portugal, pdf file on 67 pages by Dinis Cruz....
Download Hacking tutorial in PDFThis tutorial is about testing penetration and ethical hacking, designed to students. Free training document in PDF under 47 pages by Dr. Bruce V. Hartley....
IP Tunneling and VPNs TutorialThe objective of this course is to learn Virtual Private Network (VPN) fundamental and to overview tunneling techniques used for implementation of VPNs. Free pdf tutorial in PDF in 78 pages designed to beginners students....
Linux Network Administrator's GuideDownload free course Linux Network Administrator's Guide, pdf file on 507 pages by Olaf Kirch, Terry Dawson....
Internet of ThingsDownload free course Internet of Things, pdf file on 235 pages by Leon Strous, Vinton Cerf....
Computer Networking : Principles, Protocols and PracticeThis is an ongoing effort to develop an open-source networking textbook that could be used for an in-depth undergraduate or graduate networking courses. ...
VoIP Tutorial in PDFThis pdf tutorial discusses the advantages and disadvantages of using VoIP services, focusing primarily on security issues that may affect those who are new to VoIP....
Secrets of Network Cartography: A Comprehensive Guide to NmapEver wonder which Nmap scan was the right one to use? Thirteen different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Each scan method includes graphical scan descriptions and packet-by-packet analysis! - Nmap's operating system fingerprinting can pro...
Cisco ACE to NginxDownload free course Cisco ACE to Nginx, pdf file on 51 pages by Faisal Memon....