Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it...

Practical Video Game Bots: Automating Game Processes using C++, Python, and AutoIt
Practical Video Game Bots: Automating Game Processes using C++, Python, and AutoIt

Develop and use bots in video gaming to automate game processes and see possible ways to avoid this kind of automation. This book explains how bots can be very helpful in games such as multiplayer online games, both for training your character and for automating repetitious game processes in order to start a competition with human...

Windows XP Annoyances
Windows XP Annoyances
Microsoft Windows XP may be the latest in a popular family of operating systems, but that doesn't mean it's perfect. However, the designers of Windows XP have built enough flexibility into their product and provided users with a sufficiently large toolkit to overcome most shortcomings. In Windows XP Annoyances David Karp reveals his ideas...
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Maintainable JavaScript
Maintainable JavaScript
The professionalization of web development has been a difficult journey because of our disparate beginnings. Even those who end up at large companies such as Yahoo! inevitably began on their own, hacking around. Perhaps you were even “the web guy” at a small company and could do pretty much whatever you...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Taking Your iPod Touch to the Max (Technology in Action)
Taking Your iPod Touch to the Max (Technology in Action)
Fast and fun to read, Taking Your iPod Touch to the Max gives you all the tips and techniques you could ever think of to make the most of your Apple iPod Touch. Erica Sadun is an expert at hacking devices to discover undocumented tricks, and this book reveals everything and more about the functionality of the iPod Touch....
BSD Hacks
BSD Hacks
Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If...
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
HackNotes(tm) Windows Security Portable Reference
HackNotes(tm) Windows Security Portable Reference

HackNotes Windows Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques used by criminals to break into computer networks. Understand how the attacks work, then learn how to access and strengthen your Windows systems through a series of tested and trusted anti-hacking methods,...

Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy