 |
|
|
 Hacking the Human
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of... |  |  Universe (Britannica Illustrated Science Library)
There was a time when people believed
that the stars were bonfires lit by
other tribes in the sky, that the
universe was a flat plate resting on the shell
of a giant turtle, and that the Earth,
according to the Greek astronomer Ptolemy,
was at the center of the universe. From the
most remote of times, people have been
curious... |  |  Data Analysis with Open Source Tools
THIS BOOK GREW OUT OFMY EXPERIENCE OF WORKING WITH DATA FOR VARIOUS COMPANIES IN THE TECH
industry. It is a collection of those concepts and techniques that I have found to be the
most useful, including many topics that I wish I had known earlier—but didn’t.
My degree is in physics, but I also worked as a software... |
|
|
 |  |  Arduino Internals
Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic... |  |  WordPress 3 Ultimate Security
Most likely, today, some hacker tried to crack your WordPress site, its data and
content. Maybe that was just a one-off from some bored kid. Just as likely, it was an
automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it
was both.
Whether you've been successfully hacked already, else... |
|
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 |