Gli hacker non sono soltanto i pirati che rubano in maniera fraudolenta dati o inventano infernali virus che rovinano i computer, ma sono anche coloro che, grazie allo sforzo collettivo e alla condivisione dei propri saperi, costruiscono strumenti tecnologici innovativi. …
Explore the practical side of REST to build data-centric applications with Node
This course provides beginning to intermediate C++ developers with the knowledge required for up-to-date C++ programming. It begins by introducing the concepts of design patterns and idioms, outlining their usefulness, and demonstrating some traditional C++ implementations using pointers and manual memory management.
What happens when people use a smartphone to connect with your website or application? Are they delighted or frustrated? With more than a million touch-screen phones shipping every day, it’s vital that you design your site to appeal to the mobile crowd. This Learning Path will teach you how.
Large Scale Network Design LiveLessons takes you through the concepts behind stable, scalable, elegant network design, including modularity, resilience, layering, and security principles. This livelesson will focus on traditional distributed link state, distance vector, and path vector routing protocols, as well as the basic principles of centralized control planes (such as OpenFlow). A special point will be made of sorting out the relationship between policy and reachability, and where they can best be managed in a large scale network.
EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.
Explore the practical sides of REST to build data-centric applications with Node
This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff networks and scan them in order to better understand the attack landscape; and how to ethically gain access to systems, networks and data.