|
|
|
|
Mac OS X Panther Hacks: 100 Industrial Strength Tips & ToolsLike the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used... | | Hacking Vim 7.2
Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.
This book contains examples that cover... | | Hacking for DummiesFind out if your system is vulnerable to hack attacks!
"The coverage of security topics in this book can help you avoid a hack attack." — Stuart McClure
"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat... |
|
|
Intel Galileo Essentials
Leverage the power of Intel Galileo to construct amazingly simple, yet impressive projects
About This Book
-
Learn how to connect additional hardware to the Intel Galileo to easily create complex robots
-
Understand GPIO pins on the Galileo and how to use them
-
Control a DC...
| | Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... | | Cybersecurity Law
A definitive guide to cybersecurity law
Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information... |
|
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |