Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Wireless Networks For Dummies (Computer/Tech)
Hacking Wireless Networks For Dummies (Computer/Tech)
Become a cyber-hero — know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
—Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient — not...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Hacking for Dummies
Hacking for Dummies
Find out if your system is vulnerable to hack attacks!

"The coverage of security topics in this book can help you avoid a hack attack."
— Stuart McClure

"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat...

Hacking Google Maps and Google Earth (ExtremeTech)
Hacking Google Maps and Google Earth (ExtremeTech)
Going somewhere? Or just getting back?

 

Great vacation photos—too bad you can't remember where you took them. And wouldn't it have been terrific to find a pizza joint when you bumped into your college buddy in that little ski town? Well, by making Google Maps and Google Earth do your bidding, you can find out not only where...

SUSE Linux 9 Bible
SUSE Linux 9 Bible
If SUSE Linux 9 can do it, you can do it, too ...

SUSE is the oldest commercial Linux distribution, favored in Europe and rapidly gaining popularity in the United States. Whether you're just discovering Linux or switching from another distribution, this comprehensive reference gives you not only the "how-to" information, but also...

Hacking Photoshop CS2
Hacking Photoshop CS2
You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command...
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Programming Linux Games
Programming Linux Games
Programming Linux Games discusses important multimedia toolkits (including a very thorough discussion of the Simple DirectMedia Layer) and teaches the basics of Linux game programming. Readers learn about the state of the Linux gaming world, and how to write and distribute Linux games to the Linux gaming community.

This book is
...
Hacking MySpace: Mods and Customizations to make MySpace Your Space
Hacking MySpace: Mods and Customizations to make MySpace Your Space
There are over 90 million profiles on MySpace. How do you makeYOURS stand out? You use these programming tricks and tech-niques to tweak the look, feel, and content of your profile. You getthe inside scoop on hotdesign and photography.You maximize the effects of HTML and CSS. And if you happen to be amusician, you check outChapter 30 to see...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy