Home | Amazing | Today | Tags | Publishers | Years | Search 
Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Agile Software Development: Evaluating The Methods For Your Organization
Agile Software Development: Evaluating The Methods For Your Organization
Are you interested in using an Agile method for developing software? Or
are others lobbying you to approve the use of one? Or is your interest more
casual; perhaps you are merely wondering if an Agile method is worth considering?
Whichever is the case, this book is for you.

I come from the “disciplined process”
...
Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
Wireless Hacks
Wireless Hacks

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.

...
Stealing the Network: How to Own a Continent
Stealing the Network: How to Own a Continent
This book outlines a fictional plot to "own the box" by compromising an entire continent's network infrastructure. It combines a set of stories with real technology to show readers the danger that lurks in the shadows of the information security industry.

The first book in this series ...

Retro Gaming Hacks
Retro Gaming Hacks

Maybe it was the recent Atari 2600 milestone anniversary that fueled nostalgia for the golden days of computer and console gaming. Every Game Boy must ponder his roots from time to time. But whatever is driving the current retro gaming craze, one thing is certain: classic games are back for a big second act, and they're being...

Building Forums With Vbulletin
Building Forums With Vbulletin
vBulletin is a very popular, commercial discussion forums application. Written in PHP, it is the system of choice for many of the biggest and most popular discussion forums on the Internet.
This book takes you step by step through setting up and running your own vBulletin website. In easy-to-follow language, it will show you how to select a
...
Mac mini Hacks & Mods For Dummies (Computer/Tech)
Mac mini Hacks & Mods For Dummies (Computer/Tech)
Don't be shy — hack and mod your mini to discover its hidden talents

Thinking big — but still a bit hesitant to dissect your Mac mini? Well, pick up the screwdriver and keep this friendly guide within reach! These fun projects range from simple and risk-free to adventurous and cutting-edge. You'll quickly...

Hacking Photoshop CS2
Hacking Photoshop CS2
You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command...
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Hack Proofing Your Network: Internet Tradecraft
Hack Proofing Your Network: Internet Tradecraft
This is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn...
RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy