|
|
|
|
Hardware Hacking Projects for Geeks
Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for... | | How to Do Everything with Your iPhoneGet the most out of your iPhone by learning how to use all of its powerful capabilities. Filled with tips, tricks, and shortcuts, this book shows you how to set up your iPhone, make calls, manage voicemail, and load contacts. But that's just the beginning. You'll also learn how to send and receive email, look up turn-by-turn directions, listen to... | | Hack Proofing ColdFusion
In preparation for the creation of this book I spent a weekend at my home in Massachusetts setting up one of my personal computers to be a testing server. My home is serviced by AT&T and we have a high-speed modem with a fixed IP number.This, combined with the installation of some new software, made for a very fun weekend of tweaking and... |
|
|
Hack Attacks Testing: How to Conduct Your Own Security AuditLearn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the... | | Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)* From the garage to the living room, Geek House provides hackers with 10 PC-based hardware hacking projects that are not for the faint of heart! * Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything-from their sprinkler systems to the temperature of their barbecues ... | | Macworld's Mac Security Superguide
Macworld's Mac Security Superguide
Keep your data and computer safe.
The expert team of Macworld editors share their knowledge in this essential guide to keep your computer, your network, and your personal information safe and secure; further your head start when it comes to malware, get tips to keep your... |
|
Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... | | Modern PHP: New Features and Good Practices
PHP is experiencing a renaissance, though it may be difficult to tell with all of the outdated PHP tutorials online. With this practical guide, you’ll learn how PHP has become a full-featured, mature language with object-orientation, namespaces, and a growing collection of reusable component libraries.
Author Josh... | | Hack Proofing Windows 2000 ServerEssential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |