Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
2D Unity: Your First Game from Start to Finish
2D Unity: Your First Game from Start to Finish

Have you ever wanted to make a video game, but didn't know where to start? 2D Unity is an approachable guide to making your own games using Unity, the powerful, free-to-use development platform.

2D Unity contains hands-on projects that get you started making games from the ground-up. Unity's complex...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

The Superhero Book
The Superhero Book
Modern mythology leaps into the popular culture from the pages of comic books and now propels the astounding growth of the graphic novel. Aimed at the genesis, The Superhero Book is the ultimate A-to-Z compendium of everyone’s favorite overachievers in the pitched battle between good and evil. With 300 entries examining more...
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

The Birth of Satan: Tracing the Devil's Biblical Roots
The Birth of Satan: Tracing the Devil's Biblical Roots
"An informative study of the biblical origins of Satan…With resourceful though never excessive citation, Mobley and Wray make a good job of pinning down the roots of a notoriously protean character."--The Times Literary Supplement

"Let's admit it. Even in a secular age we are all still
...
The Encyclopedia of Demons and Demonology
The Encyclopedia of Demons and Demonology

The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead...

15 Dangerously Mad Projects for the Evil Genius
15 Dangerously Mad Projects for the Evil Genius

UNLEASH YOUR INNER MAD SCIENTIST!

"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing

This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for...

Switching to a Mac For Dummies
Switching to a Mac For Dummies

Maybe you love your iPhone or iPod and are curious about other Apple products. Maybe you’ve had one virus scare too many and are fed up with Windows. Maybe the daunting prospect of upgrading to Windows 7 has made you open to other possibilities. Maybe you’re a Mac fan who wants to show a friend how easy and productive Macs...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Programming Video Games for the Evil Genius
Programming Video Games for the Evil Genius
IF EVIL'S YOUR NAME, THEN THESE ARE YOUR GAMES!

Always wanted to be a genius game creator? This Evil Genius guide goes far beyond a typical programming class or text to reveal insider tips for breaking the rules and constructing wickedly fun games that you can tweak and customize to suit your needs!

In...

Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy