 |
|
 Ruby Wizardry: An Introduction to Programming for Kids
The Ruby programming language is perfect for beginners: easy to learn, powerful, and fun to use! But wouldn't it be more fun if you were learning with the help of some wizards and dragons?
Ruby Wizardry is a playful, illustrated tale that will teach you how to program in Ruby by taking you on a fantastical... |  |  BeagleBone Home Automation
The Internet of Things is now being taken up by tech corporations but this fantastic book brings you the DIY approach to home automation using BeagleBone. From dimming the lights to opening the garage door -- it's all here.
Overview
-
Practical approach to home automation using BeagleBone; starting from...
|  |  Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Overview
-
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
-
Explore the insights and importance of testing your corporate network systems before the hackers strike
-
Understand the...
|
|
 What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, firewalls and antivirus software are also not enough
to protect critical assets. This... |  |  Perl One-Liners: 130 Programs That Get Things Done
Part of the fun of programming in Perl lies in tackling tedious tasks with short, efficient, and reusable code. Often, the perfect tool is the one-liner, a small but powerful program that fits in one line of code and does one thing really well.
In Perl One-Liners, author and impatient hacker Peteris... |  |  Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |