Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking iPod and iTunes (ExtremeTech)
Hacking iPod and iTunes (ExtremeTech)
How to Mod The Pod and fine-tune iTunes

Does your iPod go wherever you do? This book will take the two of you on your most exciting adventure–deep into iPod’s awesome potential. You already know it’s a musical prodigy, but wait 'til you teach your iPod to take notes, give you the weather and stock quotes, keep your...

Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)
Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...

Machine Learning Projects for .NET Developers
Machine Learning Projects for .NET Developers

Machine Learning Projects for .NET Developers shows you how to build smarter .NET applications that learn from data, using simple algorithms and techniques that can be applied to a wide range of real-world problems. You’ll code each project in the familiar setting of Visual Studio, while the machine learning logic uses F#, a...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Hadoop in Practice
Hadoop in Practice

Summary

Hadoop in Practice collects 85 Hadoop examples and presents them in a problem/solution format. Each technique addresses a specific task you'll face, like querying big data using Pig or writing a log file loader. You'll explore each problem step by step, learning both how to build and deploy...

Exploiting Software : How to Break Code
Exploiting Software : How to Break Code
How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools,
...
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an...

Windows 8 Hacks
Windows 8 Hacks

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy