Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...
Hacking Exposed Mobile: Security Secrets & Solutions
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Proven security tactics for today's mobile apps,devices, and networks
"A great overview of the new threats created...
Java in 21 Days, Sams Teach Yourself (Covering Java 8) (7th Edition)
In just 21 days you can acquire the knowledge and skills necessary to develop applications on your computer and apps that run on Android phones and tablets. With this complete tutorial you’ll quickly master the basics and then move on to more advanced features and concepts.
Completely updated for Java 8,...
Beginning NFC: Near Field Communication with Arduino, Android, and PhoneGap
Jump into the world of Near Field Communications (NFC), the fast-growing technology that lets devices in close proximity exchange data, using radio signals. With lots of examples, sample code, exercises, and step-by-step projects, this hands-on guide shows you how to build NFC applications for Android, the Arduino microcontroller,...
Learn Java the Easy Way: A Hands-On Introduction to Programming
Java is the world’s most popular programming language, but it’s known for having a steep learning curve. Learn Java the Easy Way takes the chore out of learning Java with hands-on projects that will get you building real, functioning apps right away.
You’ll start by familiarizing yourself...
Intermediate Security Testing with Kali Linux 2
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...
|Result Page: 39 38 37 36 35 34 33 32 31 30 |