Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Your Own Electronics Lab: A Guide to Setting Up Your Own Gadget Workshop
Building Your Own Electronics Lab: A Guide to Setting Up Your Own Gadget Workshop
We’re surrounded by electronics these days. Did you ever wonder how it all worked? Do you know just enough about electricity to be dangerous? Would you like to learn more? Then this book is for you.

There are many excellent textbooks on how electricity works. This is not one of them. This book helps you get
...
15 Dangerously Mad Projects for the Evil Genius
15 Dangerously Mad Projects for the Evil Genius

UNLEASH YOUR INNER MAD SCIENTIST!

"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing

This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for...

Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity

Are you looking for the right Guide to improve your technical skills in programming and cybersecurity?

Would you like to start your own business or look for a job with better knowledge in computer programming and data protection?

Would you like to be sure to have in your hands a manual...

Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Linux Server Security: Hack and Defend
Linux Server Security: Hack and Defend

Learn how to attack and defend the world’s most popular web server platform

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy