Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Hacker Attack
Hacker Attack
Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or...
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
CEH Certified Ethical Hacker Study Guide
CEH Certified Ethical Hacker Study Guide

Prepare for the new version of CEH certification with this advanced guide

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this...

Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)
Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)

Making Big Data Work: Real-World Use Cases and Examples, Practical Code, Detailed Solutions

 

Large-scale data analysis is now vitally important to virtually every business. Mobile and social technologies are generating massive datasets;...

Hacking RSS and Atom
Hacking RSS and Atom
Now you can satisfy your appetite for information

This book is not about the minutia of RSS and Atom programming. It's about doing cool stuff with syndication feeds—making the technology give you exactly what you want the way you want. It's about building a feed aggregator and routing feeds to your e-mail or iPod, producing and hosting...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy