|
|
|
|
Hacker's Guide to Project Management, Second Edition (Computer Weekly Professional)Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the... | | Hacker Disassembling UncoveredThis text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a... | | 1337 h4x0r h4ndb00kThis is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337... |
|
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... | | Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... | | Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Join today’s new revolution in creativity and community: hackerspaces. Stop letting other people build everything for you: Do it yourself. Explore, grab the tools, get hands-on, get dirty…and create things you never imagined you could. Hack This is your glorious, full-color passport to the... |
|
|
Network Backup with Bacula [How-to]
In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.
"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system... | | | | Web Applications (Hacking Exposed)"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project
Unleash the hackers' arsenal to secure your Web applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as... |
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |