Home | Amazing | Today | Tags | Publishers | Years | Search 
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Arduino and Kinect Projects: Design, Build, Blow Their Minds
Arduino and Kinect Projects: Design, Build, Blow Their Minds
If you've done some Arduino tinkering and wondered how you could incorporate the Kinect in your projects — or the other way around — this book is for you.

If you haven’t actually done any tinkering but you are looking for a good way to get started, this book might also be for you. Even though
...
Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Building Your Own Electronics Lab: A Guide to Setting Up Your Own Gadget Workshop
Building Your Own Electronics Lab: A Guide to Setting Up Your Own Gadget Workshop
We’re surrounded by electronics these days. Did you ever wonder how it all worked? Do you know just enough about electricity to be dangerous? Would you like to learn more? Then this book is for you.

There are many excellent textbooks on how electricity works. This is not one of them. This book helps you get
...
Team Geek: A Software Developer's Guide to Working Well with Others
Team Geek: A Software Developer's Guide to Working Well with Others
Life is full of unexpected twists, and the two of us never imagined we’d someday write a book about software engineering.

Like most computer geeks, we discovered that our hobby and passion—playing with computers—was a great way to make a living after graduating college. And
...
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...

XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming
XDA Developers' Android Hacker's Toolkit: The Complete Guide to Rooting, ROMs and Theming

Make your Android device truly your own

Are you eager to make your Android device your own but you're not sure where to start? Then this is the book for you. XDA is the world's most popular resource for Android hacking enthusiasts, and a huge community has grown around customizing Android devices with XDA....

tinyAVR Microcontroller Projects for the Evil Genius
tinyAVR Microcontroller Projects for the Evil Genius

CREATE FIENDISHLY FUN tinyAVR MICROCONTROLLER PROJECTS

This wickedly inventive guide shows you how to conceptualize, build, and program 34 tinyAVR microcontroller devices that you can use for either entertainment or practical purposes. After covering the development process, tools, and power supply sources, tinyAVR...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy