 |
|
|
 |  |  Hacking Roomba: ExtremeTechThe jetsons would be proud
A gizmo as cool as Roomba just begs to be hacked. Now, with this book and the official ROI specification furnished by iRobot®, you can become the robotic engineer you dreamed of being when you were 10. Build a Bluetooth interface for your Roomba. Turn it into an artist.... |  |  The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... |
|
 |  |  |  |  51 High-Tech Practical Jokes for the Evil GeniusGive your friends and family the shock of their lives! 51 High-Tech Practical Jokes for the Evil Genius has everything you need to pull devastatingly funny (and safe!) technical pranks. From the “evasive beeping thing” to “rats in the walls” to the “rigged lie detector,” you’ll find a plethora of... |
|
 Linux System Programming: Talking Directly to the Kernel and C LibraryThis book is about writing software that makes the most effective use of the system you're running on -- code that interfaces directly with the kernel and core system libraries, including the shell, text editor, compiler, debugger, core utilities, and system daemons. The majority of both Unix and Linux code is still written at the system level, and... |  |  Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |  |  Juniper(r) Networks Secure Access SSL VPN Configuration GuideJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for... |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |