 |
|
 Windows 8 Hacks
Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the... |  |  Learning Joomla! 3 Extension Development-Third Edition
Joomla 3 is the first of the major open source content management systems that was meant to be mobile friendly by default. Joomla uses object-oriented principles, is database agnostic, and has the best mix of functionality, extensibility, and user friendliness. Add to that the fact that Joomla is completely community driven, and you have a... |  |  Instant Metasploit Starter
The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.
This book is written in such a way that... |
|
|
 Hacking Vim 7.2
Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.
This book contains examples that cover... |  |  Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.
Enterprise Mac... |  |  Ubuntu: Powerful Hacks and Customizations
Tune, tweak, and change the popular Ubuntu Linux operating system!
Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops, and servers, and is used by millions of people around the world. This book provides you with practical hacks and tips that are not readily available online,... |
|
 Microsoft Dynamics GP 2010 Cookbook
Microsoft Dynamics GP is an Enterprise Resource Planning system, essentially an accounting system on steroids, designed for mid-sized organizations. The implementation of Dynamics GP is usually considered to be complex, and people often realize there must be more efficient ways of working with the system. This book will show readers how to... |  |  Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... |  |  Visual Basic Game Programming for Teens
Visual Basic Game Programming for Teens, Third Edition teaches teens and other beginners how to create their own 2D role-playing game (RPG) using the free to download and easy to use Visual Basic 2008 Express. The game is built step-by-step throughout the book as readers learn new skills and build upon them. This new edition features almost... |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |