Windows 8 has been described by Microsoft as its ‘boldest’ Windows release ever and the 8.1 update enhances the paradigm further. Beginning Windows 8.1 takes you through the new features and helps you get more out of the familiar to reveal the fullest possibilities for this amazing new operating system.
If you can write WordPress plug-ins, you can make WordPress do just about anything. From making the site easier to administer, to adding the odd tweak or new feature, to completely changing the way your blog works, plug-ins are the method WordPress offers to customize and extend its functionality. This book will show you how to build all...
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
How much do you need to know about electronics to create something interesting, or creatively modify something that already exists? If you’d like to build an electronic device, but don’t have much experience with electronics components, this hands-on workbench reference helps you find answers to technical questions...
This is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn...
Don't be shy — hack and mod your mini to discover its hidden talents
Thinking big — but still a bit hesitant to dissect your Mac mini? Well, pick up the screwdriver and keep this friendly guide within reach! These fun projects range from simple and risk-free to adventurous and cutting-edge. You'll quickly...
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...
Even if you've finished Halo 2 in Legendary Mode, you're not done with this game. Not by a long shot. You know there's a lot more you can squeeze out of Halo 2, and with the clever hacks we have in store, you'll turn the game into a whole new experience. Halo 2 Hacks is the creation of...
An MIT "hack" is an ingenious, benign, andanonymous prank or practical joke, often requiring engineering or scientificexpertise and often pulled off under cover of darkness -- instances of campus mischief sometimes coinciding withApril Fool's Day, final exams, or commencement. (It should not beconfused with the sometimes...
This book is based on a course in cryptography at the upper level under
graduate and beginning graduate level that has been given at the University
of Maryland since 1997. When designing the course, we decided on the fol
lowing requirements.
• The course should be up-to-date and cover a broad selection of topics
from a...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...