|
|
|
|
Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | Raspberry Pi Projects For Dummies
Join the Raspberry revolution with these fun and easy Piprojects
The Raspberry Pi has opened up a whole new world of innovationfor everyone from hardware hackers and programmers to students,hobbyists, engineers, and beyond. Featuring a variety of hands-onprojects, this easy-to-understand guide walks you through everystep of... | | Hacker Disassembling UncoveredThis text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a... |
|
1337 h4x0r h4ndb00kThis is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337... | | How to Cheat at Securing LinuxLinux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased... | | Practical Cryptology and Web SecuritySecurity is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web. ... |
|
Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... | | Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.
After a crash course ... |
|
Personal Firewalls for Administrators and Remote UsersPersonal firewalls explained—for remote corporate and home users.
In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these... | | Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from ... | | Maintainable JavaScript
The professionalization of web development has been a difficult journey because of our
disparate beginnings. Even those who end up at large companies such as Yahoo! inevitably
began on their own, hacking around. Perhaps you were even “the web guy” at
a small company and could do pretty much whatever you ... |
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |