Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking for Dummies
Hacking for Dummies
Find out if your system is vulnerable to hack attacks!

"The coverage of security topics in this book can help you avoid a hack attack."
— Stuart McClure

"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Hacking Photoshop CS2
Hacking Photoshop CS2
You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command...
Mac OS X Hacks
Mac OS X Hacks
Mac OS X Hacks reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH,...
Hacking GPS (ExtremeTech)
Hacking GPS (ExtremeTech)
You'll get lost in this book, but nowhere else

Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Obstruction of Justice: How the Deep State Risked National Security to Protect the Democrats
Obstruction of Justice: How the Deep State Risked National Security to Protect the Democrats
Investigative reporter Luke Rosiak is being hailed as “one of the smartest, most diligent reporters in Washington” (TUCKER CARLSON) and “a bulldog” (DANA LOESCH) for uncovering “what is possibly the largest scandal and coverup in the history of the United States House of Representatives” (NEWT...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Hacking For Dummies (For Dummies)
Hacking For Dummies (For Dummies)

Learn to hack your own system to protect against malicious attacks from outside

Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This...

Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy