|
|
|
|
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,... | | Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat... | | Hacking Windows XP (ExtremeTech)Check out the view from Steve Sinchak's Windows
Sure, Windows XP is already superior to its predecessors. But what if you could make it even better? Well, stop reading the cover and buy this book, because that’s exactly what it teaches you. This is the serious stuff–step-by-step hacks that beef up speed and security, customize... |
|
|
iOS Hacker's Handbook
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS... | | Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | Hacking for DummiesFind out if your system is vulnerable to hack attacks!
"The coverage of security topics in this book can help you avoid a hack attack." — Stuart McClure
"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat... |
|
Raspberry Pi User Guide
Make the most out of the world’s first truly compact computer
It's the size of a credit card, it can be charged like a smartphone, it runs on open-source Linux, and it holds the promise of bringing programming and playing to millions at low cost. And now you can learn how to use this amazing computer from its... | | History of Cognitive Neuroscience
History of Cognitive Neuroscience documents the major neuroscientific experiments and theories over the last century and a half in the domain of cognitive neuroscience, and evaluates the cogency of the conclusions that have been drawn from them.
-
Provides a companion work to the highly acclaimed Philosophical...
| | Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |