 |
|
|
|
|
 |  |  |  |  Hacking del.icio.usI wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own... |
|
 The Robosapien Companion: Tips, Tricks, and Hacks (Technology in Action)You'll lovenThe Robosapien Companion: Tips, Tricks, and Hacks whether you're a robotics expert or beginner. And whether you own a Robosapien or not, or are anticipating the V2 release, you'll learn about the workings and theory of this fun robot. An owner of several Robosapiens himself, author Jamie Samans covers everything from basics like... |  |  Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... |  |  Cryptography and Public Key Infrastructure on the InternetCryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation, ... |
|
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 |