Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
Protect Your Information With Intrusion Detection (Power)
Protect Your Information With Intrusion Detection (Power)

Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an...

Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP
Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XP
Targeting IT professionals, system administrators, and experienced users moving to the Windows XP platform, this book enables the user to master registry concepts and architecture, provides a historical overview of the registry, and outlines the differences between Windows 9x/ME and Windows NT/2000/XP registries. Special attention is drawn to the...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
Code Optimization: Effective Memory Usage
Code Optimization: Effective Memory Usage

A guide to optimizing programs on the PC and Unix platforms, this book covers the expediency of optimization and the methods to increase the speed of programs via optimization. Discussed are typical mistakes made by programmers that lessen the performance of the system along with easily implemented solutions. Detailed descriptions of the...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

 
   
unlimited object storage image
Result Page: 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy