Home | Amazing | Today | Tags | Publishers | Years | Search 
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Coders at Work
Coders at Work

Peter Seibel interviews 15 of the most interesting computer programmers alive today in Coders at Work, offering a brand-new companion volume to Apress’s highly acclaimed best-seller Founders at Work by Jessica Livingston. As the words “at work” suggest, Peter Seibel focuses on how his...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork
Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork

What is a bicycle? The answer is a little trickier than you might think. More than just a form of transportation, your bike is a framework on which you can explore and display your own inventiveness.With a full history of the bicycle and information about commercial mods such as adding baby seats and fenders--as well as instruction...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Protecting Networks with SATAN
Protecting Networks with SATAN

SATAN (Security Administrator's Tool for Analyzing Networks) is a powerful aid for system administrators. It performs "security audits," scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of...

Game Hacking: Developing Autonomous Bots for Online Games
Game Hacking: Developing Autonomous Bots for Online Games

You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.

Bring your knowledge of Windows-based development and memory management, and Game...

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

History of Cognitive Neuroscience
History of Cognitive Neuroscience

History of Cognitive Neuroscience documents the major neuroscientific experiments and theories over the last century and a half in the domain of cognitive neuroscience, and evaluates the cogency of the conclusions that have been drawn from them.

  • Provides a companion work to the highly acclaimed Philosophical...
How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers
How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers

"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015

The H-1B visa is the gateway for the world’s best and...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy