Learning Penetration Testing with Python
Utilize Python scripting to execute effective and efficient penetration tests
About This Book
Understand how and where Python scripts meet the need for penetration testing
Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Real World Microsoft Access Database Protection and Security
Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...
Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day
A ground-breaking account of the first 24 hours of the D-Day invasion told by a symphony of incredible accounts of unknown and unheralded members of the Allied – and Axis – forces.
An epic battle that involved 156,000 men, 7,000 ships and 20,000 armoured vehicles, D-Day was, above all, a tale of...
Hacking BlackBerry: ExtremeTech Here's an even better way to get your BlackBerry fix
Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or...
Hacking GPS (ExtremeTech) You'll get lost in this book, but nowhere else
Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...
The Code Book: How to Make It, Break It, Hack It, Crack It
It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...
|Result Page: 7 6 5 4 3 2 1 |