|
|
|
|
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context... | | Hacking Photoshop CS2You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command... | | Mac OS X HacksMac OS X Hacks reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH,... |
|
Hacking GPS (ExtremeTech)You'll get lost in this book, but nowhere else
Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power... | | The Code Book: How to Make It, Break It, Hack It, Crack ItIt’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,... | | |
|
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 |