|
|
|
|
| | Designing BSD Rootkits: An Introduction to Kernel HackingDesigning BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike... | | Replication Techniques in Distributed Systems (Advances in Database Systems)The dream behind interconnecting large numbers of computers has been to have their combined capabilities serve users as one. This distributed computer would compose its resources so as to offer functionality, dependability, and performance, that far exceed those offered by a single isolated computer. This dream has started to be realized, insofar... |
|
| | Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." — HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for... | | Professional Mobile Application Development
IN RECENT YEARS, MOBILE DEVICES have gained popularity due to lower costs, small and sleek sizes, and the capability to act as a computer with you at all times. The increased use of mobile devices has created new issues for developers and network administrators, such as how to secure the devices, how to deal with increases in bandwidth, and... |
|
|
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |