Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Phrasebook
Linux Phrasebook

Linux Phrasebook

is sure to become the pocket guide that you keep within reach at all times. This concise, handy reference can be used "in the street," just like a language phrasebook. Skipping the usual tutorial on Linux, the ...

Wireless Hacking: Projects for Wi-Fi Enthusiasts
Wireless Hacking: Projects for Wi-Fi Enthusiasts

Welcome to the world of “wireless magic.” 802.11 (Wi-Fi) wireless LANs have exploded onto the scene with an excitement not seen since the introduction of the Internet itself. Getting rid of the wires means getting rid of the hassle.With Wi-Fi, you can roam through your favorite coffee shop, boardroom or living room, all the while...

Build the Ultimate Custom PC
Build the Ultimate Custom PC

Take control of your PC!

Why do they load up a PC with stuff you don't need and leave off the things you really want? Don't take it anymore! Grab a screwdriver and let these two experts show you how to build the PC of your dreams, even if you've never cracked a case before. You'll learn to choose...

1337 h4x0r h4ndb00k
1337 h4x0r h4ndb00k
This is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337...
Inside Network Security Assessment: Guarding Your IT Infrastructure
Inside Network Security Assessment: Guarding Your IT Infrastructure
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the...
Astronomy Hacks
Astronomy Hacks

Do you relish viewing and identifying celestial objects? Whether you're a first timer or an advanced hobbyist, you will find Astronomy Hacks makes a brilliant cosmic companion. Why use the traditional approach in admiring and studying the stars when you can turn computers, handheld devices, and...

Professional Windows Desktop and Server Hardening (Programmer to Programmer)
Professional Windows Desktop and Server Hardening (Programmer to Programmer)

Although not well known, Microsoft Windows has the best security of any popular operating system in the world today. What Windows has is poor default security. There are specific steps any professional can take to significantly increase the security of Microsoft Windows. Unfortunately, most books and the news media keep reinforcing the failed,...

Car PC Hacks
Car PC Hacks
A car PC or carputer is a car tricked-out with electronics for playing radio, music and DVD movies, connecting to the Internet, navigating and tracking with satellite, taking photos, and any electronic gadget a person wants in a car. All these devices are managed and controlled through a single screen or interface. The only place car PC enthusiasts...
Google Hacks: Tips & Tools for Finding and Using the World's Information
Google Hacks: Tips & Tools for Finding and Using the World's Information

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding...

HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

HackNotes(tm) Web Security Pocket Reference
HackNotes(tm) Web Security Pocket Reference

HackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted...

Hacking RSS and Atom
Hacking RSS and Atom
Now you can satisfy your appetite for information

This book is not about the minutia of RSS and Atom programming. It's about doing cool stuff with syndication feeds—making the technology give you exactly what you want the way you want. It's about building a feed aggregator and routing feeds to your e-mail or iPod, producing and hosting...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy