Home | Amazing | Today | Tags | Publishers | Years | Search 
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Building Wireless Sensor Networks: with ZigBee, XBee, Arduino, and Processing
Building Wireless Sensor Networks: with ZigBee, XBee, Arduino, and Processing

Get ready to create distributed sensor systems and intelligent interactive devices using the ZigBee wireless networking protocol and Series 2 XBee radios. By the time you're halfway through this fast-paced, hands-on guide, you'll have built a series of useful projects, including a complete ZigBee wireless network that...

Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

30 Arduino Projects for the Evil Genius
30 Arduino Projects for the Evil Genius

30 Ways to Have Some Computer-Controlled Evil Fun!

This wickedly inventive guide shows you how to program and build a variety of projects with the Arduino microcontroller development system. Covering Windows, Mac, and Linux platforms, 30 Arduino Projects for the Evil Genius gets you up to speed with the simplified C...

Raspberry Pi Projects For Dummies
Raspberry Pi Projects For Dummies

Join the Raspberry revolution with these fun and easy Piprojects

The Raspberry Pi has opened up a whole new world of innovationfor everyone from hardware hackers and programmers to students,hobbyists, engineers, and beyond. Featuring a variety of hands-onprojects, this easy-to-understand guide walks you through everystep of...

Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

C Programming :: Step By Step Beginner's To Experts Edition.
C Programming :: Step By Step Beginner's To Experts Edition.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

C in Depth :: Easy Beginner's To Expert's Guide.
C in Depth :: Easy Beginner's To Expert's Guide.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy