 |
|
|
|
|
 Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... |  |  The Book of JavaScript, 2nd Edition: A Practical Guide to Interactive Web PagesThe Book of JavaScript teaches readers how to add interactivity, animation, and other tricks to their web sites with JavaScript. Rather than provide a series of cut-and-paste scripts, thau! takes the reader through a series of real world JavaScript code with an emphasis on understanding. Each chapter focuses on a few important JavaScript... |  |  The Debian System: Concepts and TechniquesThe Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user interfaces (GUIs). Debian may appear simplistic and even slightly outdated, but it is actually very robust, scalable, and secure. Debian's open development... |
|
 The Book of Postfix: State-of-the-Art Message TransportSendmail is the "King of the Hill" of the open source mail transport world, but Postfix is gaining steam. Wietse Venema, creator of TCP Wrapper and co-developer of TCT (The Coroner's Toolkit), wrote Postfix to create a faster and more secure mail transport application.
Setting up and maintaining any email server application is no walk... |  |  Ubuntu Linux for Non-Geeks: A Pain-Free, Project-Based, Get-Things-Done GuidebookThis newbie's guide to Ubuntu lets readers learn by doing. Using immersion-learning techniques favored by language courses, step-by-step projects build upon earlier tutorial concepts, stimulating the brain and increasing the reader's understanding. It also covers all the topics likely to be of interest to an average desktop user, such as... |  |  Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,... |
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 |