Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Do Everything with Your iPhone
How to Do Everything with Your iPhone
Get the most out of your iPhone by learning how to use all of its powerful capabilities. Filled with tips, tricks, and shortcuts, this book shows you how to set up your iPhone, make calls, manage voicemail, and load contacts. But that's just the beginning. You'll also learn how to send and receive email, look up turn-by-turn directions, listen to...
Hack Proofing ColdFusion
Hack Proofing ColdFusion

In preparation for the creation of this book I spent a weekend at my home in Massachusetts setting up one of my personal computers to be a testing server. My home is serviced by AT&T and we have a high-speed modem with a fixed IP number.This, combined with the installation of some new software, made for a very fun weekend of tweaking and...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Big Book of Windows Hacks
Big Book of Windows Hacks
Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB...
Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
* From the garage to the living room, Geek House provides hackers with 10 PC-based hardware hacking projects that are not for the faint of heart!
* Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything-from their sprinkler systems to the temperature of their barbecues
...
Macworld's Mac Security Superguide
Macworld's Mac Security Superguide

Macworld's Mac Security Superguide

Keep your data and computer safe.

The expert team of Macworld editors share their knowledge in this essential guide to keep your computer, your network, and your personal information safe and secure; further your head start when it comes to malware, get tips to keep your...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Modern PHP: New Features and Good Practices
Modern PHP: New Features and Good Practices

PHP is experiencing a renaissance, though it may be difficult to tell with all of the outdated PHP tutorials online. With this practical guide, you’ll learn how PHP has become a full-featured, mature language with object-orientation, namespaces, and a growing collection of reusable component libraries.

Author Josh...

Hack Proofing Windows 2000 Server
Hack Proofing Windows 2000 Server
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include...
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy