 |
|
|
|
 Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen... |  |  CD Cracking Uncovered: Protection Against Unsanctioned CD CopyingA manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver... |  |  OS X for Hackers at Heart: The Apple of Every Hacker's EyeThe sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research... |
|
 MP3: The Definitive GuideMP3, standing for MPEG-1, Layer 3, is a codec for compressing the size of audio files for digital distribution. Much more than a definition, MP3 is nothing less than a cultural and economic revolution on the Internet. Every day, hundreds of thousands of MP3 music files are searched for, shared, recorded and listened to by computer and Internet... |  |  Hacking del.icio.usI wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own... |  |  Botnets: The Killer Web AppThis is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world... |
|
|
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 |