|
|
|
|
| | | | Designing BSD Rootkits: An Introduction to Kernel HackingDesigning BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike... |
|
Linksys WRT54G Ultimate HackingThis book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the... | | The Zope Book (Landmark)The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope... | | Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in
modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals
wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was
a later version of the term,... |
|
Hacking Windows Vista: ExtremeTech"Why didn't they ask me before they did that?"
Vista is the most radical revamping of Windows since 1995. But along with all the fantastic improvements, there are a couple of things that drive you up the wall. Maybe you're not seeing the performance you expect. Security is better, but boy, is it annoying. And what's with... | | Securing the Smart Grid: Next Generation Power Grid Security
"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of... | | CEH Certified Ethical Hacker Study Guide
Prepare for the new version of CEH certification with this advanced guide
Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this... |
|
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.
... | | XML Hacks : 100 Industrial-Strength Tips and ToolsThis practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete set of tips, tricks, and tools for web developers, system administrators, and programmers who want to leverage the untapped power of XML. If you want more than the average XML user--to explore and experiment, discover clever... | | The Handbook of Information and Computer EthicsThis handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment;... |
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |