Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking: The Art of Exploitation
Hacking: The Art of Exploitation
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.

Hacking is the art of creating problem solving, whether used to find an unconventional solution to...

Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,...

Mathematics For JEE (Main & Advanced), Geometry- Vol. 4
Mathematics For JEE (Main & Advanced), Geometry- Vol. 4
The JEE (Main & Advanced) is one of the hardest exams to crack for students, for a very simple reason – concepts cannot be learned by rote, they have to be absorbed, and IIT believes in strong concepts. Each question in the JEE (Main & Advanced) entrance exam is meant to push the analytical ability of the student to...
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic...
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
How to Recruit and Hire Great Software Engineers: Building a Crack Development Team
How to Recruit and Hire Great Software Engineers: Building a Crack Development Team

Want a great software development team? Look no further. How to Recruit and Hire Great Software Engineers: Building a Crack Development Team is a field guide and instruction manual for finding and hiring excellent engineers that fit your team, drive your success, and provide you with a competitive advantage. Focusing on proven...

Small Fatigue Cracks: Mechanics, Mechanisms and Applications
Small Fatigue Cracks: Mechanics, Mechanisms and Applications

This book contains the fully peer-reviewed papers presented at the Third Engineering Foundation Conference on Small Fatigue Cracks, held under the chairmanship of K.S. Ravichandran and Y. Murakami during December 6-11, 1998, at the Turtle Bay Hilton, Oahu, Hawaii. This book presents a state-of-the-art description of the mechanics, mechanisms...

Fatigue of Structures and Materials
Fatigue of Structures and Materials
Fatigue of structures and materials covers a wide scope of different topics. The purpose of the present book is to explain these topics, to indicate how they can be analyzed, and how this can contribute to the designing of fatigue resistant structures and to prevent structural fatigue problems in service.

This book is...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Dynamic Fracture Mechanics
Dynamic Fracture Mechanics

This book consists of 9 chapters encompassing both the fundamental aspects of dynamic fracture mechanics as well as the studies of fracture mechanics in novel engineering materials. The chapters have been written by leading authorities in various fields of fracture mechanics from all over the world. These chapters have been arranged...

Micromechanics of Fracture in Generalized Spaces
Micromechanics of Fracture in Generalized Spaces

By the detailed analysis of the modern development of the mechanics of deformable media can be found the deep internal contradiction. From the one hand it is declared that the deformation and fracture are the hierarchical processes which are linked and unite several structural and scale levels. From the other hand the sequential investigation of...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy