Search Results - (((((((kant OR want) OR mantis) OR when) OR cantor) OR anne) OR shared) OR hints) algorithms.

Search alternatives:

Refine Results
  1. 621
  2. 622

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Metasploit Payloads / Peter Van Eeckhoutte -- Meterpreter / Peter Van Eeckhoutte -- Exploiting WebDAV Default Credentials / Peter Van Eeckhoutte -- Running a Script on the Target Web Server / Peter Van Eeckhoutte -- Uploading a Msfvenom Payload / Peter Van Eeckhoutte -- Exploiting Open phpMyAdmin / Peter Van Eeckhoutte -- Downloading a File with TFTP / Peter Van Eeckhoutte -- Downloading Sensitive Files / Peter Van Eeckhoutte -- Downloading a Configuration File / Peter Van Eeckhoutte -- Downloading the Windows SAM / Peter Van Eeckhoutte -- Exploiting a Buffer Overflow in Third-Party Software / Peter Van Eeckhoutte -- Exploiting Third-Party Web Applications / Peter Van Eeckhoutte -- Exploiting a Compromised Service / Peter Van Eeckhoutte -- Exploiting Open NFS Shares / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 9. …”
    Full text (MFA users only)
    Electronic eBook
  3. 623

    Optimal learning by Powell, Warren B., 1955-

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  4. 624
  5. 625
  6. 626
  7. 627

    Power system monitoring and control by Bevrani, Hassan

    Published 2014
    Full text (MFA users only)
    Electronic eBook