 |
|
|
 Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... |  |  |  |  Stealing the Network: How to Own a ShadowThe best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress... |
|
 Hacker's Guide to Visual FoxPro 7.0An irreverent look at how Visual FoxPro really works, this guide gives developers insight into every command, function, event, and method of version 7.0, including Service Pack One. Recognized within the FoxPro developer community as the indispensable resource for serious FoxPro development, this updated edition covers Visual FoxPro's Power ... |  |  Hacking For Dummies (Computer/Tech)Welcome to Hacking For Dummies, 2nd Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your own information systems, find security vulnerabilities, and fix the weaknesses before criminal hackers and rogue insiders have an opportunity to take advantage of... |  |  Hacker's Delight
This is a collection of small programming tricks that I have come across over many years. Most of them will work only on computers that represent integers in two's-complement form. Although a 32-bit machine is assumed when the register length is relevant, most of the tricks are easily adapted to machines with other register... |
|
 Lifehacker: 88 Tech Tricks to Turbocharge Your DayRedefine your personal productivity by tweaking, modding, mashing up, and repurposing Web apps, desktop software, and common everyday objects. The 88 "life hacks" -- clever shortcuts and lesser-known, faster ways to complete a task -- in this book are some of the best in Lifehacker.com's online archive. Every chapter describes an... |  |  CISA Exam Prep: Certified Information Systems Auditor (ACM Press)The CISA Exam Prep provides you with the market's most comprehensive and current material for passing the new CISA certification exam. Exam Prep's best-selling study methods feature chapter review questions, practice exams, exam alerts, notes, tips, and cautions. You'll also have exclusive access to online test... |  |  Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... |
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |