 |
|
|
 Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read... |  |  Decompiling Android
Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps. ... |  |  15 Dangerously Mad Projects for the Evil Genius
UNLEASH YOUR INNER MAD SCIENTIST!
"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing
This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for... |
|
|
 Kali Linux Social Engineering
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux
Overview
-
Learn about various attacks and tips and tricks to avoid them
-
Get a grip on efficient ways to perform penetration testing.
-
Use advanced techniques to bypass...
|  |  Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Overview
-
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
-
Explore the insights and importance of testing your corporate network systems before the hackers strike
-
Understand the...
|  |  Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were
involved in some of the fi rst penetration tests performed in the UK, where large organizations and
government departments allowed ethical hackers into their networks to determine the risk they
faced from what are now known as cyber attacks.... |
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |