Hacking Leadership

Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly (repost)

Mike Myatt, "Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly"
2013 | ISBN: 1118817419 | English | 208 Pages | EPUB | 3 MB
Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly

Hacking Leadership: The 11 Gaps Every Business Needs to Close and the Secrets to Closing Them Quickly by Mike Myatt
2013 | ISBN: 1118817419 | English | 208 Pages | EPUB | 3 MB
Hacking: 3 Books in 1- The Ultimate Beginner's Guide to Learn Hacking Effectively + Tips and Tricks to learn Hacking

Hacking: 3 Books in 1- The Ultimate Beginner's Guide to Learn Hacking Effectively + Tips and Tricks to learn Hacking + Strategies(Basic Security, Wireless Hacking, Ethical Hacking, Programming)
English | 2017 | ASIN: B074HD6WRB | 170 pages | AZW3 | 0.2 Mb
WiFi Hacking for Beginners: Learn Hacking by Hacking WiFi networks (Penetration testing, Hacking, Wireless Networks)

WiFi Hacking for Beginners: Learn Hacking by Hacking WiFi networks (Penetration testing, Hacking, Wireless Networks)
English | 2017 | ASIN: B073PL9JF6 | 24 pages | AZW3/PDF/EPUB (conv) | 1 Mb
Hacking Marketing: Agile Practices to Make Marketing Smarter, Faster, and More Innovative [Audiobook]

Scott Brinker, Walter Dixon (Narrator), "Hacking Marketing: Agile Practices to Make Marketing Smarter, Faster, and More Innovative"
ISBN: n/a, ASIN: B06X6GYNWW | 2017 | MP3@64 kbps | ~06:38:00 | 170 MB

Udemy - GROWTH HACKING: How To Grow Your Company Fast  eBooks & eLearning

Posted by IrGens at Nov. 11, 2015
Udemy - GROWTH HACKING: How To Grow Your Company Fast

Udemy - GROWTH HACKING: How To Grow Your Company Fast
.MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 64 kbps, 2 Ch | 49 Lectures | 1.5 hours | 206 MB
Instructor: Jackie Burgoa
Certified Ethical Hacker: Ethical Hacking and Countermeasures CEHv6 - Training Labs

Certified Ethical Hacker: Ethical Hacking and Countermeasures CEHv6
EC-Council | 2008 | 4 x DVD ISO (3.72Gb+3.35Gb+3.34Gb+1.21Gb)


EC-Council Course Description
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions  eBooks & eLearning

Posted by Alexpal at Sept. 29, 2009
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
McGraw-Hill Osborne | December 17, 2007 | ISBN: 0071494618 | 258 pages | PDF | 6 MB

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.

Ubuntu using hacking  eBooks & eLearning

Posted by AlenMiler at Aug. 21, 2017
Ubuntu using hacking

Ubuntu using hacking by Meet Chauhan
English | 19 Aug. 2017 | ASIN: B074YX9S6V | 122 Pages | AZW3 | 1.98 MB

Quandaries of School Leadership: Voices from Principals in the Field  eBooks & eLearning

Posted by AvaxGenius at Aug. 20, 2017
Quandaries of School Leadership: Voices from Principals in the Field

Quandaries of School Leadership: Voices from Principals in the Field By Debra J. Touchton, Mariela A. Rodríguez, Gary Ivory, Michele Acker-Hocevar
English | PDF | 2017 (2018 Edition) | 252 Pages | ISBN : 3319591193 | 2.23 MB

This book provides insights into the everyday practices of school leaders as told through the real-life stories of principals. The editors and their contributors blend practice with theory, helping aspiring leaders to discover that school leadership is not simply putting prescribed solutions into action, but a constant encounter with quandaries that demand thinking, responding, and adjusting to the situations at hand.