Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical DWR 2 Projects (Expert's Voice in Java)
Practical DWR 2 Projects (Expert's Voice in Java)

The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to develop. One of those libraries has risen near the top in the Java space, and that library is DWR. DWR, or Direct Web Remoting, allows you to treat your Java classes running on the server as if they were local objects running...

Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Car Hacks and Mods for Dummies
Car Hacks and Mods for Dummies

So you want to turn your Yugo into a Viper? Sorry--you need a certified magician. But if you want to turn your sedate sedan into a mean machine or your used car lot deal into a powerful, purring set of wheels, you’ve come to the right place. Car Hacks & Mods for Dummies will get you turbo-charged up about modifying your car...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Building WordPress Themes from Scratch
Building WordPress Themes from Scratch

Walk through the steps you need to build your very own WordPress theme! Included with the book is a WordPress theme and other necessary files, so roll up your sleeves and let Joe take you through the process explaining what you need to do - and why you’re doing it - every step of the way. Hi, I’m Joe, the author of Building...

Programming Python
Programming Python

As Python's creator. I'd like to say a few words about its origins, adding a bit of personal philosophy.

Over six years ago. in December 1989; I was looking for a "hobby" programming project that would keep me occupied during the week around Christmas. My office (a government-run research lab in Amsterdam)
...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor
Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor
This cookbook contains ready-to-use hacks to solve problems Vim users encounter daily, from personalizing Vim to optimizations that boost productivity. It does not cover basic use of the editor but focuses on making life easier for experienced Vim users. Vim is a highly configurable, open-source, multi-platform text editor that is included as...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy