Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
BeagleBone For Dummies
BeagleBone For Dummies

The definitive, easy-to-use guide to the popular BeagleBone board

BeagleBone For Dummies is the definitive beginner's guide to using the popular BeagleBone board to learn electronics and programming. Unlike other books that require previous knowledge of electronics, Linux, and Python, this one assumes you know...

XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming
XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming

Make your Android device truly your own

Are you eager to make your Android device your own but you're not sure where to start? Then this is the book for you. XDA is the world's most popular resource for Android hacking enthusiasts, and a huge community has grown around customizing Android devices with XDA....

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Building Your Own Electronics Lab: A Guide to Setting Up Your Own Gadget Workshop
Building Your Own Electronics Lab: A Guide to Setting Up Your Own Gadget Workshop
We’re surrounded by electronics these days. Did you ever wonder how it all worked? Do you know just enough about electricity to be dangerous? Would you like to learn more? Then this book is for you.

There are many excellent textbooks on how electricity works. This is not one of them. This book helps you get
...
Team Geek: A Software Developer's Guide to Working Well with Others
Team Geek: A Software Developer's Guide to Working Well with Others
Life is full of unexpected twists, and the two of us never imagined we’d someday write a book about software engineering.

Like most computer geeks, we discovered that our hobby and passion—playing with computers—was a great way to make a living after graduating college. And
...
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Arduino and Kinect Projects: Design, Build, Blow Their Minds
Arduino and Kinect Projects: Design, Build, Blow Their Minds
If you've done some Arduino tinkering and wondered how you could incorporate the Kinect in your projects — or the other way around — this book is for you.

If you haven’t actually done any tinkering but you are looking for a good way to get started, this book might also be for you. Even though
...
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy