|
|
|
|
Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... | | | | Hacking the Cable Modem: What Cable Companies Don't Want You to KnowIn the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable... |
|
|
|
The Oracle Hacker's Handbook: Hacking and Defending Oracle
Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you... | | Excel Hacks: Tips & Tools for Streamlining Your Spreadsheets
Millions of users create and share Excel spreadsheets every day, but few go deeply enough to learn the techniques that will make their work much easier. There are many ways to take advantage of Excel's advanced capabilities without spending hours on advanced study. Excel Hacks provides more than 130 hacks -- clever tools, tips... | | Python Penetration Testing Essentials
Employ the power of Python to get the best out of pentesting
About This Book
-
Learn to detect and avoid various types of attacks that put the privacy of a system at risk
-
Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
... |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |