Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Make, Volume 6: Technology on Your Time (Make: Technology on Your Time)
Make, Volume 6: Technology on Your Time (Make: Technology on Your Time)

If you like to tweak, disassemble, recreate, and invent cool new uses for technology, you'll love MAKE, our quarterly publication for the inquisitive do-it-yourselfer.

Every issue is packed with projects to help you make the most of all the technology in your life. Everything from home entertainment systems, to...

BSD Hacks
BSD Hacks
Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If...
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
Carry On: Sound Advice from Schneier on Security
Carry On: Sound Advice from Schneier on Security

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon...

The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...

Hacking For Dummies
Hacking For Dummies

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully...

Learning Ruby
Learning Ruby
You don't have to know everything about a car to drive one, and you don't need to know everything about Ruby to start programming with it. Written for both experienced and new programmers alike, Learning Ruby is a just-get-in-and-drive book -- a hands-on tutorial that offers lots of Ruby programs and lets you know how and why they work,...
Beginning Windows 10: Do More with Your PC
Beginning Windows 10: Do More with Your PC

Beginning Windows 10 takes you through the new features of this amazing new operating system, revealing some of its surprising capabilities, and helping you customize it to suit you. Whether you are new to Windows, or you want to get up to speed with the latest features and changes, this book has everything you need to get started.

...
Hacking Movable Type (ExtremeTech)
Hacking Movable Type (ExtremeTech)
Ready to push Movable Type to the max?

Movable Type, that amazingly powerful personal publishing application, is the superhero of the Internet age. But when you push, poke, stretch, and otherwise coax it into producing even more, the possibilities for your Web content are simply superlative. Roll up your sleeves and get moving—here's the...

The Definitive Guide to Catalyst: Writing Extensible, Scalable and Maintainable Perl Based Web Applications
The Definitive Guide to Catalyst: Writing Extensible, Scalable and Maintainable Perl Based Web Applications
I have been with the Catalyst framework team since the beginning. We have come a long way from our beginnings as a few guys in an IRC channel trying to hack together a better way to write web applications. Catalyst is now powering multi-million-dollar sites all over the world. It has a thriving community of developers, with thousands of people...
Hacking the Cable Modem: What Cable Companies Don't Want You to Know
Hacking the Cable Modem: What Cable Companies Don't Want You to Know
In the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable...
Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper-level under- graduate and beginning graduate level that has been given at the University of Maryland since 1997, and a course that bos been taught at Rutgers Uni- versity since 2003. When designing the courses, we decided on the following requirements:

• The
...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy