Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

It's hard to remember a world without the Internet. We now take for granted that we can access our bank accounts and health records, get driving directions, talk to friends, and shop, all on the Internet. Many companies couldn't survive without it because it is their link to their customers.

But the...

Testing Web Security: Assessing the Security of Web Sites and Applications
Testing Web Security: Assessing the Security of Web Sites and Applications
Protect your company’s Web site from hack attacks with this guide to proven security-testing techniques

It’s only a matter of time before an unscrupulous would-be intruder decides to attack your organization’s Web site. If they’re successful, you could lose confidential customer information, intellectual property, or...

Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork
Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork

What is a bicycle? The answer is a little trickier than you might think. More than just a form of transportation, your bike is a framework on which you can explore and display your own inventiveness.With a full history of the bicycle and information about commercial mods such as adding baby seats and fenders--as well as instruction...

VoIP Hacks : Tips & Tools for Internet Telephony (Hacks)
VoIP Hacks : Tips & Tools for Internet Telephony (Hacks)

Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Deploying Rails Applications: A Step-by-Step Guide (Facets of Ruby)
Deploying Rails Applications: A Step-by-Step Guide (Facets of Ruby)
First you'll learn how to build out your shared, virtual, or dedicated host. Then, you'll see how to build your applications for production and deploy them with one step, every time. Deploying Rails Applications will take you from a simple shared host through a highly scalable clustered and balanced setup with Nginx.

See how to tell whether...

Network Security Hacks
Network Security Hacks

Nowhere is the term hacker more misconstrued than in the network security field. This is understandable because the very same tools that network security professionals use to probe the robustness of their own networks also can be used to launch attacks on any machine on the Internet. The...

50 Android Hacks
50 Android Hacks

Summary

The best programming techniques are often the shortest and simplest—the hacks. In this compact and infinitely useful book, Android expert Carlos Sessa delivers 50 hacks that will save you time, stretch your skills, and maybe even make you smile.

About this Book

Hacks....

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Building iPhone and iPad Electronic Projects: Real-World Arduino, Sensor, and Bluetooth Low Energy Apps in techBASIC
Building iPhone and iPad Electronic Projects: Real-World Arduino, Sensor, and Bluetooth Low Energy Apps in techBASIC

Why simply play music or go online when you can use your iPhone or iPad for some really fun projects, such as building a metal detector, hacking a radio control truck, or tracking a model rocket in flight? Learn how to build these and other cool things by using iOS device sensors and inexpensive hardware such as Arduino and a...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy