Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 9386

While DevOps, cloud, and containers have reshaped the IT landscape over the past five years, Kubernetes has served as de facto operating system of this cloud native world. But with the myriad possibilities Kubernetes provides, developers and operations personnel continue to seek advice on coherent, workable strategies for using this container-orchestration system in a production environment. That’s where this... more...

Key Features Carry out penetration testing in highly-secured environments with Metasploit Learn to bypass different defenses to gain access into different systems. A step-by-step guide that will quickly enhance your penetration testing skills. Book Description This book will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms... more...

Containers are here and resistance is futile! Now that we're getting our heads around Docker, we need an orchestration platform to help us manage our containerized apps. Kubernetes has emerged as the hottest and most important container orchestration platform in the world. This book gets you up to speed fast, and it's constantly kept up-to-date!

Develop, debug and profile your C++ applications using the MinGW open source software Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Learn how to use MinGW with new projects, and how to integrate it with old ones. Learn how to integrate your applications with well-known, open source, GUI libraries. Vital tips on how to use the most popular open source Integrated... more...

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of... more...


Key Features Provide a secure, easy-to-manage extensible platform for hosting your websites Leverage IIS 10.0 in order to deploy web site in seconds Integrate Windows and Nano Server 2016 and automate it with PowerShell Recipes to Manage and monitor your IIS 10.0 Book Description This book will start with customizing your IIS 10 to various platforms/OS and tune it according to your business requirements. Moving... more...

Create powerful WPF applications using Telerik controls with the help of real-world examples Overview Display database information in the Telerik WPF controls Get useful tips on creating engaging, interactive user experiences for Windows desktop applications Build powerful, responsive, and scalable line-of-business and enterprise applications using Telerik WPF controls In Detail Telerik Reporting is a lightweight... more...

Learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and Security Toolkits to this day Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Downloading, compiling, and installing Netcat on Windows and Linux platforms. Establish a raw network connection so you can understand how Netcat processes information using a... more...

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to... more...

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to... more...