Học liệu mở

  • Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2 includes contents: Chapter 7: ten simple security searches that work; chapter 8: tracking down web servers, login portals, and network hardware; chapter 9: usernames, passwords, and secret stuff, oh my!; chapter 10: hacking google services; chapter 11: Google hacking showcase; chapter 12: protecting yourself from google hackers.

     278 p daihocthudo 29/01/2024 13 0

  • Ebook Big book of windows hacks (First edition): Part 1

    Ebook Big book of windows hacks (First edition): Part 1

    includes contents: Chapter 01: startup and shutdown; chapter 02: hacking the interface; chapter 03: windows explorer, managing files, and search; chapter 04: internet explorer, the web and the internet; chapter 05: networking; chapter 06: email.

     324 p daihocthudo 29/01/2024 10 0

  • Ebook Big book of windows hacks (First edition): Part 2

    Ebook Big book of windows hacks (First edition): Part 2

    Ebook Big book of windows hacks (First edition): Part 2 includes contents: Chapter 07: web and the internet; chapter 08: security; chapter 09: applications, home server, and backup; chapter 10: graphics and multimedia; chapter 11: system performance; chapter 12: hardware; chapter 13: the registry and group policy editor.

     330 p daihocthudo 29/01/2024 10 0

  • Ebook Network security illustrated: Part 1

    Ebook Network security illustrated: Part 1

    Ebook Network security illustrated: Part 1 includes contents: Part I managing security, part II outsourcing options, part III reserving rights, part IV determining identity, part V preserving privacy, part VI connecting networks.

     232 p daihocthudo 29/01/2024 11 0

  • Ebook Network security illustrated: Part 2

    Ebook Network security illustrated: Part 2

    Ebook Network security illustrated: Part 2 includes contents: Part VII hardening networks, part VIII storing information, part IX hiding information, part X accessing information, part XI ensuring availability, part XII detecting intrusions.

     217 p daihocthudo 29/01/2024 9 0

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 2

    Ebook Flash professional CS5 advanced for windows and macintosh: Part 2

    Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 7 controlling and displaying graphics, chapter 8 controlling sound, chapter 9 controlling information flow, chapter 10 controlling text, chapter 11 manipulating information, chapter 12 managing content and troubleshooting.

     286 p daihocthudo 29/01/2024 12 0

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 1

    Ebook Flash professional CS5 advanced for windows and macintosh: Part 1

    Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 1 building complexity, chapter 2 working with video, chapter 3 getting a handle on actionscript, chapter 4 advanced buttons and event handling, chapter 5 controlling multiple timelines, chapter 6 managing external communication.

     243 p daihocthudo 29/01/2024 11 0

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2

    Ebook Hacking exposed: Linux security secrets solutions - Part 2

    Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

     316 p daihocthudo 29/01/2024 9 0

  • Ebook Hacking exposed: Linux security secrets solutions - Part 1

    Ebook Hacking exposed: Linux security secrets solutions - Part 1

    Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.

     268 p daihocthudo 29/01/2024 10 0

  • Ebook Tangled web - Tales of digital crime from the shadows of cyberspace: Part 1

    Ebook Tangled web - Tales of digital crime from the shadows of cyberspace: Part 1

    Ebook Tangled web - Tales of digital crime from the shadows of cyberspace: Part 1 includes contents: Chapter 1: welcome to the shadow side of cyberspace; chapter 2: inside the mind of the cybercriminal; chapter 3: been down so long it looks like up to me: the extent and scope of the cybercrime problem; chapter 4: let it bleed: the cost of computer crime and related security breaches; chapter 5: did the 1990s begin with a big lie? chapter 6:...

     225 p daihocthudo 29/01/2024 9 0

  • Ebook Thống kê ứng dụng trong kinh doanh và quản lý (với sự hỗ trợ của Excel & SPSS): Phần 1

    Ebook Thống kê ứng dụng trong kinh doanh và quản lý (với sự hỗ trợ của Excel & SPSS): Phần 1

    Phần 1 của cuốn sách "Thống kê ứng dụng trong kinh doanh và quản lý (với sự hỗ trợ của Excel & SPSS)" trình bày những nội dung chính sau: chương 1 - giới thiệu môn học; chương 2 - thu thập dữ liệu thống kê; chương 3 - tóm tắt và trình bày dữ liệu; chương 4 - mô tả dữ liệu bằng các đặc trưng đo lường; chương 5 - điều tra chọn mẫu và phân phối...

     130 p daihocthudo 30/09/2023 65 0

  • Ebook Thống kê ứng dụng trong kinh doanh và quản lý (với sự hỗ trợ của Excel & SPSS): Phần 2

    Ebook Thống kê ứng dụng trong kinh doanh và quản lý (với sự hỗ trợ của Excel & SPSS): Phần 2

    Phần 2 của cuốn sách "Thống kê ứng dụng trong kinh doanh và quản lý (với sự hỗ trợ của Excel & SPSS)" trình bày những nội dung chính sau: chương 7 - kiểm định giả thuyết; chương 8 - phân tích phương sai; chương 9 - kiểm định phi tham số; chương 10 - tương quan và hồi quy; chương 11 - dãy số thời gian; chương 12 - chỉ số;... Mời các bạn cùng tham khảo!

     162 p daihocthudo 30/09/2023 56 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=cdsphanoi