Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would
...

Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Programming Lego Mindstorms with Java (With CD-ROM)
Programming Lego Mindstorms with Java (With CD-ROM)
Soon after its release, the LEGO MINDSTORMS Robotics Invention System (RIS) quickly became popular not only with its initial intended audience of children aged 11 and up, but also within a community of adult LEGO robotics enthusiasts that developed and spread worldwide with significant help from the Internet. Before long, hackers had deciphered the...
Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Hacking For Dummies
Hacking For Dummies

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully...

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Web Application Defender's Cookbook: Battling Hackers and Protecting Users

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you...

Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so...

Linux Network Administrator's Guide
Linux Network Administrator's Guide
Linux, a UNIX-compatible operating system that runs on personal computers, is a pinnacle within the free software movement. It is based on a kernel developed by Finnish student Linus Torvalds and is distributed on the Net or on low-cost disks, along with a complete set of UNIX libraries, popular free software utilities, and traditional layered...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy