Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Damage and Failure of Composite Materials
Damage and Failure of Composite Materials

Understanding damage and failure of composite materials is critical for reliable and cost-effective engineering design. Bringing together materials mechanics and modeling, this book provides a complete guide to damage, fatigue and failure of composite materials. Early chapters focus on the underlying principles governing composite damage,...

Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design

Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer...

Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

The $1 Million Reason to Change Your Mind
The $1 Million Reason to Change Your Mind

What is the $1 million reason to change your mind?

Change the way you think and you will change your world. Simple.

In this book Pat Mesiti will teach you how to shrug off the shackles of mediocrity, find your inner millionaire and think differently about life and money -- and get rich and happy along the way!

...
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways...
Monitoring with Ganglia
Monitoring with Ganglia
In 1999, I packed everything I owned into my car for a cross-country trip to begin my new job as Staff Researcher at the University of California, Berkeley Computer Science Department. It was an optimistic time in my life and the country in general. The economy was well into the dot-com boom and still a few years...
Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy