Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Objective-C on the Mac (Learn Series)
Learn Objective-C on the Mac (Learn Series)
Take your coding skills to the next level with this extensive guide to Objective–C, the native programming language for developing sophisticated software applications for Mac OS X. Objective–C is a powerful, object–oriented extension of C, making this book the perfect follow–up to Dave Mark’s...
Hacking MySpace: Mods and Customizations to make MySpace Your Space
Hacking MySpace: Mods and Customizations to make MySpace Your Space
There are over 90 million profiles on MySpace. How do you makeYOURS stand out? You use these programming tricks and tech-niques to tweak the look, feel, and content of your profile. You getthe inside scoop on hotdesign and photography.You maximize the effects of HTML and CSS. And if you happen to be amusician, you check outChapter 30 to see...
Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a...

Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,...

Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

Managing and Leading Software Projects
Managing and Leading Software Projects
Discover the fundamental techniques for managing and leading software projects

This book bridges the communication gap between project managers and software developers working toward the common goal of developing successful software products and software systems. It provides the insights, methods, tools, and techniques necessary to understand...

   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy