Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Hacking RSS and Atom
Hacking RSS and Atom
Now you can satisfy your appetite for information

This book is not about the minutia of RSS and Atom programming. It's about doing cool stuff with syndication feeds—making the technology give you exactly what you want the way you want. It's about building a feed aggregator and routing feeds to your e-mail or iPod, producing and hosting...

Hacking GMail (ExtremeTech)
Hacking GMail (ExtremeTech)
Welcome to Hacking Gmail. Thanks for buying this book. If you haven’t bought it,
you should. It’s very good, and once you buy it you can stop loitering around the
bookstore stacks. Go on: Buy it, sit down, have a coffee. See? Comfier isn’t it? Ah.
Hacking Gmail. It’s a manly hobby, and this book will tell you
...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Coding Freedom: The Ethics and Aesthetics of Hacking
Coding Freedom: The Ethics and Aesthetics of Hacking

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Wireless Hacking: Projects for Wi-Fi Enthusiasts
Wireless Hacking: Projects for Wi-Fi Enthusiasts

Welcome to the world of “wireless magic.” 802.11 (Wi-Fi) wireless LANs have exploded onto the scene with an excitement not seen since the introduction of the Internet itself. Getting rid of the wires means getting rid of the hassle.With Wi-Fi, you can roam through your favorite coffee shop, boardroom or living room, all the while...

Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical...
PC Magazine - 21 August 2007
PC Magazine - 21 August 2007
First Looks
GoToMeeting v3.0
GuardedID 1.02
Howard Verity TW3
Kodak EasyShare 5300 All-In-One printer
Logitech X-240
MSI Q677 Crystal Edition
Nokia E61i
Oki Printing Solutions C6000n
Panasonic Lumix DMC-FZ8
RealPlayer 11 (beta)
Sennheiser PXC 450 NoiseGard
Sony VAIO VGN-SZ370P
Adobe
...
Microsoft  Windows 7 Your Way: Speed Up and Customize Window
Microsoft Windows 7 Your Way: Speed Up and Customize Window

Want to make Windows 7 run faster, smarter, easier, better? Want to personalize Windows to look and act the way you want it to? Want to get
more efficient and ditch all those Windows hassles? You don’t need
a Ph.D in computer science or expensive upgrades. All you need is this book!

...
Learning Joomla! 3 Extension Development-Third Edition
Learning Joomla! 3 Extension Development-Third Edition

Joomla 3 is the first of the major open source content management systems that was meant to be mobile friendly by default. Joomla uses object-oriented principles, is database agnostic, and has the best mix of functionality, extensibility, and user friendliness. Add to that the fact that Joomla is completely community driven, and you have a...

Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers
Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers

Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy