Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Asterisk Hacking
Asterisk Hacking
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all...
Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

The Browser Hacker's Handbook
The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...

Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
Peers, Pirates, and Persuasion: Rhetoric in the Peer-to-Peer Debates
PEERS, PIRATES, AND PERSUASION: RHETORIC IN THE PEER-TO-PEER DEBATES investigates the role of rhetoric in shaping public perceptions about a novel technology: peer-to-peer file-sharing networks. While broadband Internet services now allow speedy transfers of complex media files, Americans face real uncertainty about whether peer-to-peer file...
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

CISSP All-in-One Exam Guide, Second Edition
CISSP All-in-One Exam Guide, Second Edition
This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP certification!

The Certified Information Systems Security Professional (CISSP) exam covers ten domains, each of which may be considered a full field of study in itself, with many individual books and papers
...
Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read...

Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling

"Ron Goldman is a leading expert who knows the fundamental concepts and their interconnectedness, as well as the small details. The elegance of the writing and of the methods used to present the material allows us to get a deep understanding of the central concepts of CAGD. In its simplicity and pure beauty, the theory indeed resembles the...

Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Ubuntu: Powerful Hacks and Customizations
Ubuntu: Powerful Hacks and Customizations

Tune, tweak, and change the popular Ubuntu Linux operating system!

Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops, and servers, and is used by millions of people around the world. This book provides you with practical hacks and tips that are not readily available online,...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy