Home | Amazing | Today | Tags | Publishers | Years | Search 
Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork
Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork

What is a bicycle? The answer is a little trickier than you might think. More than just a form of transportation, your bike is a framework on which you can explore and display your own inventiveness.With a full history of the bicycle and information about commercial mods such as adding baby seats and fenders--as well as instruction...

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would
...

Joomla! VirtueMart 1.1 Theme and Template Design
Joomla! VirtueMart 1.1 Theme and Template Design

Since you picked this book, the odds will be that you are already familiar with Joomla! VirtueMart. You will agree that this open source e-commerce solution is definitely amazing and feature-rich. That's why you want to stick with it. However, you still find there are some things here and there that don't quite fit your requirements....

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper-level under- graduate and beginning graduate level that has been given at the University of Maryland since 1997, and a course that bos been taught at Rutgers Uni- versity since 2003. When designing the courses, we decided on the following requirements:

• The
...

Using Mac OS X Lion Server: Managing Mac Services at Home and Office
Using Mac OS X Lion Server: Managing Mac Services at Home and Office
People often ask me if I think Apple is a company that knows how to make a good server. My answer is usually a little longer than what those people probably had in mind. Tim Berners-Lee wrote the first web server in 1989 on a computer running the NeXTSTEP operating system. At the time, NeXTSTEP was a fledgling,...
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

Hack Proofing ColdFusion
Hack Proofing ColdFusion

In preparation for the creation of this book I spent a weekend at my home in Massachusetts setting up one of my personal computers to be a testing server. My home is serviced by AT&T and we have a high-speed modem with a fixed IP number.This, combined with the installation of some new software, made for a very fun weekend of tweaking and...

From Russia with Tough Love: Pavel's Kettlebell Workout for a Femme Fatale
From Russia with Tough Love: Pavel's Kettlebell Workout for a Femme Fatale

In Russia, kettlebells have long been revered as the fitness-tool of choice for Olympic athletes, elite special forces and martial artists. The kettlebell’s ballistic movement challenges the body to achieve an unparalleled level of physical conditioning and overall strength.

But until now, the astonishing benefits of the...

Pragmatic Guide to JavaScript (Pragmatic Guides)
Pragmatic Guide to JavaScript (Pragmatic Guides)

The JavaScript ecosystem can be tough to hack through, even for experienced programmers. There are so many extensive JavaScript reference books and competing libraries to choose from-Prototype, jQuery, MooTools, YUI, Dojo, ExtJS, and so on.

Christophe Porteneuve is here to help: he gives you fundamentals, the most
...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy