Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Learning Perl
Learning Perl

Welcome to the sixth edition of Learning Perl, updated for Perl 5.14 and its latest features. This book is still good even if you are still using Perl 5.8 (although, it’s been a long time since it was released; have you thought about upgrading?).

If you’re looking for the best way to spend your first 30 to 45 hours...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Robot Builder's Bonanza, 4th Edition
Robot Builder's Bonanza, 4th Edition

Which of these fields are involved in robotics? You may choose from the following: engineering, electronics, psychology, sociology, biology, physics, artificial intelligence, math, art, mechanical design, mechanical construction, computer programming, sound synthesis, vision, ultrasonics, linguistics, microelectronics, process control,...

Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Maintainable JavaScript
Maintainable JavaScript
The professionalization of web development has been a difficult journey because of our disparate beginnings. Even those who end up at large companies such as Yahoo! inevitably began on their own, hacking around. Perhaps you were even “the web guy” at a small company and could do pretty much whatever you...
Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy