Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Windows 8.1 (Expert's Voice in Windows 8)
Beginning Windows 8.1 (Expert's Voice in Windows 8)

Windows 8 has been described by Microsoft as its ‘boldest’ Windows release ever and the 8.1 update enhances the paradigm further. Beginning Windows 8.1 takes you through the new features and helps you get more out of the familiar to reveal the fullest possibilities for this amazing new operating system.

...
WordPress Plugin Development
WordPress Plugin Development

If you can write WordPress plug-ins, you can make WordPress do just about anything. From making the site easier to administer, to adding the odd tweak or new feature, to completely changing the way your blog works, plug-ins are the method WordPress offers to customize and extend its functionality. This book will show you how to build all...

The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Practical Electronics: Components and Techniques
Practical Electronics: Components and Techniques

How much do you need to know about electronics to create something interesting, or creatively modify something that already exists? If you’d like to build an electronic device, but don’t have much experience with electronics components, this hands-on workbench reference helps you find answers to technical questions...

Hack Proofing Your Network: Internet Tradecraft
Hack Proofing Your Network: Internet Tradecraft
This is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn...
Mac mini Hacks & Mods For Dummies (Computer/Tech)
Mac mini Hacks & Mods For Dummies (Computer/Tech)
Don't be shy — hack and mod your mini to discover its hidden talents

Thinking big — but still a bit hesitant to dissect your Mac mini? Well, pick up the screwdriver and keep this friendly guide within reach! These fun projects range from simple and risk-free to adventurous and cutting-edge. You'll quickly...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Halo 2 Hacks: Tips & Tools for Finishing the Fight
Halo 2 Hacks: Tips & Tools for Finishing the Fight

Even if you've finished Halo 2 in Legendary Mode, you're not done with this game. Not by a long shot. You know there's a lot more you can squeeze out of Halo 2, and with the clever hacks we have in store, you'll turn the game into a whole new experience. Halo 2 Hacks is the creation of...

Nightwork: A History of Hacks and Pranks at MIT
Nightwork: A History of Hacks and Pranks at MIT

An MIT "hack" is an ingenious, benign, andanonymous prank or practical joke, often requiring engineering or scientificexpertise and often pulled off under cover of darkness -- instances of campus mischief sometimes coinciding withApril Fool's Day, final exams, or commencement. (It should not beconfused with the sometimes...

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy