Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Hacking Photoshop CS2
Hacking Photoshop CS2
You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command...
Joomla! 1.5 Top Extensions Cookbook
Joomla! 1.5 Top Extensions Cookbook

It is a cookbook which means it contains step-by-step instructions to use joomla extensions to achieve the optimal site. It shows you how to perform specific tasks in Joomla! using the popular extensions available in Joomla! extensions directory. It will also help you choose right extension for performing a specific task in Joomla! If you...

Linux Phrasebook
Linux Phrasebook

Linux Phrasebook

is sure to become the pocket guide that you keep within reach at all times. This concise, handy reference can be used "in the street," just like a language phrasebook. Skipping the usual tutorial on Linux, the ...

Excel Hacks: 100 Industrial-Strength Tips and Tools
Excel Hacks: 100 Industrial-Strength Tips and Tools
The tips and tools in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language. This resourceful, roll-up-your-sleeves guide...
Hacking BlackBerry: ExtremeTech
Hacking BlackBerry: ExtremeTech
Here's an even better way to get your BlackBerry fix

Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Mac OS X Hacks
Mac OS X Hacks
Mac OS X Hacks reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH,...
Hacking GPS (ExtremeTech)
Hacking GPS (ExtremeTech)
You'll get lost in this book, but nowhere else

Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy