Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Build Mobile Apps with Ionic 2 and Firebase: Hybrid Mobile App Development
Build Mobile Apps with Ionic 2 and Firebase: Hybrid Mobile App Development
Learn to build hybrid mobile apps using Ionic and Firebase. You'll build a Hacker News client app, which can view top stories in Hacker News, view comments of a story, add stories to favorites, etc. 

This introductory guide covers the whole cycle of hybrid mobile apps development. It's organized around implementing
...
Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. How can a person's identity be stolen? What exactly is a "hacker"? How much damage can a 17...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork
Make: Bicycle Projects: Upgrade, Accessorize, and Customize with Electronics, Mechanics, and Metalwork

What is a bicycle? The answer is a little trickier than you might think. More than just a form of transportation, your bike is a framework on which you can explore and display your own inventiveness.With a full history of the bicycle and information about commercial mods such as adding baby seats and fenders--as well as instruction...

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The thrilling memoir of the world's most wanted computer hacker

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed
...

Maximum Security (3rd Edition)
Maximum Security (3rd Edition)
Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know,...
Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy