Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dungeon Master 4th Edition For Dummies
Dungeon Master 4th Edition For Dummies
Whether you've been a Dungeon Master (DM) before and want to fine-tune your skills or want to get ready and take the plunge, this is the book for you. It gives you the basics on running a great game, info for more advanced dungeon mastering, guidelines for creating adventures, and tips for building a campaign. It shows you how to:
Core JSP
Core JSP

In recent years, a large amount of software development activity has migrated from the client to the server. The client-centric model, in which a client executes complex programs to visualize and manipulate data, is no longer considered appropriate for the majority of enterprise applications. The principal reason is deployment—it is a...

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are...

Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

PSP Hacks : Tips & Tools for Your Mobile Gaming and Entertainment Handheld
PSP Hacks : Tips & Tools for Your Mobile Gaming and Entertainment Handheld

Sure, it's just what you've been clamoring for: an ultra slick, portable version of the most popular console gaming system in the world. But Sony's new PlayStation Portable (PSP) isn't just a handheld gaming device. Beyond its killer graphics and spectacular widescreen LCD for unparalleled game play, it also sports wireless...

Bike, Scooter, and Chopper Projects for the Evil Genius
Bike, Scooter, and Chopper Projects for the Evil Genius
Greetings! Glad that you decided to take an interest in the best hobby you will ever know! Maybe you are already a seasoned garage hacker and have decided to build a few of the projects from this book, adding your own special modifications, of course. Or, maybe you have never thought about taking an angle grinder to a working bicycle, chopping it...
Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy