Home | Amazing | Today | Tags | Publishers | Years | Search 
The Zope Book (Landmark)
The Zope Book (Landmark)
The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
Hacking MythTV (ExtremeTech)
Hacking MythTV (ExtremeTech)
Want control? Build your own MythTV PC.

You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,...

Learning Ruby
Learning Ruby
You don't have to know everything about a car to drive one, and you don't need to know everything about Ruby to start programming with it. Written for both experienced and new programmers alike, Learning Ruby is a just-get-in-and-drive book -- a hands-on tutorial that offers lots of Ruby programs and lets you know how and why they work,...
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used...
Deploying Rails Applications: A Step-by-Step Guide (Facets of Ruby)
Deploying Rails Applications: A Step-by-Step Guide (Facets of Ruby)
First you'll learn how to build out your shared, virtual, or dedicated host. Then, you'll see how to build your applications for production and deploy them with one step, every time. Deploying Rails Applications will take you from a simple shared host through a highly scalable clustered and balanced setup with Nginx.

See how to tell whether...

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Bike, Scooter, and Chopper Projects for the Evil Genius
Bike, Scooter, and Chopper Projects for the Evil Genius
Greetings! Glad that you decided to take an interest in the best hobby you will ever know! Maybe you are already a seasoned garage hacker and have decided to build a few of the projects from this book, adding your own special modifications, of course. Or, maybe you have never thought about taking an angle grinder to a working bicycle, chopping it...
Hacking iPod and iTunes (ExtremeTech)
Hacking iPod and iTunes (ExtremeTech)
How to Mod The Pod and fine-tune iTunes

Does your iPod go wherever you do? This book will take the two of you on your most exciting adventure–deep into iPod’s awesome potential. You already know it’s a musical prodigy, but wait 'til you teach your iPod to take notes, give you the weather and stock quotes, keep your...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy