|
|
|
|
Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman... | | Hackers and Painters: Big Ideas from the Computer Age
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. "
--from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham
We are living in the computer age, in a world increasingly designed and... | | The Best Damn Cybercrime and Forensics Book PeriodAs is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.
If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the... |
|
Game Hacking: Developing Autonomous Bots for Online Games
You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.
Bring your knowledge of Windows-based development and memory management, and Game... | | Learning Linux Binary Analysis
Key Features
-
Grasp the intricacies of the ELF binary format of UNIX and Linux
-
Design tools for reverse engineering and binary forensic analysis
-
Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Book Description
Learning... | | Technology Matters: Questions to Live With
Winner, 2009 Sally Hacker Prize given by the Society for the History of Technology (SHOT). and Choice Outstanding Academic Title, 2006
Technology matters, writes David Nye, because it is inseparable from being human. We have used tools for more than 100,000 years, and their central purpose has not always been to... |
|
|
| | | | Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |