|
|
|
|
Hacking Roomba: ExtremeTechThe jetsons would be proud
A gizmo as cool as Roomba just begs to be hacked. Now, with this book and the official ROI specification furnished by iRobot®, you can become the robotic engineer you dreamed of being when you were 10. Build a Bluetooth interface for your Roomba. Turn it into an artist.... | | The Complete Idiot's Guide to LinuxComplete Idiot's Guide To Linux, Second Edition, covers: Preparing to install the system, Using shells and online documentation, The X Windows graphical interface, Networking and Internet, Administration, Configuring Linux for multimedia , and A guide to available software and tools. If you have been wanting to get started using Linux, but are not... | | Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... |
|
Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | Hacker Disassembling UncoveredThis text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a... | | 1337 h4x0r h4ndb00kThis is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337... |
|
SUSE Linux 9 BibleIf SUSE Linux 9 can do it, you can do it, too ...
SUSE is the oldest commercial Linux distribution, favored in Europe and rapidly gaining popularity in the United States. Whether you're just discovering Linux or switching from another distribution, this comprehensive reference gives you not only the "how-to" information, but also... | | Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... | | Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
|
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |