Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. How can a person's identity be stolen? What exactly is a "hacker"? How much damage can a 17...
Beginning Python: From Novice to Professional, Second Edition
Beginning Python: From Novice to Professional, Second Edition
Gain a fundamental understanding of Python’s syntax and features with the second edition of Beginning Python, an up–to–date introduction and practical reference. Covering a wide array of Python–related programming topics, including addressing language internals, database integration, network programming, and web...
XML in Flash (Sams Other)
XML in Flash (Sams Other)
XML in Flash is an excellent introduction to creating state-of-the-art Flash applications with XML. XML is quickly becoming the most popular way to store and manage data. Flash's XML Socket makes it possible to network Flash front-ends to an application server. This allows developers to use a Flash interface for applications such as message boards,...
Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:

  • Shows you how to speed it up, lock it down, or pull back the curtains.
  • Dives into default system settings,...
Hacking iPod and iTunes (ExtremeTech)
Hacking iPod and iTunes (ExtremeTech)
How to Mod The Pod and fine-tune iTunes

Does your iPod go wherever you do? This book will take the two of you on your most exciting adventure–deep into iPod’s awesome potential. You already know it’s a musical prodigy, but wait 'til you teach your iPod to take notes, give you the weather and stock quotes, keep your...

Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • The Zope Book (Landmark)
    The Zope Book (Landmark)
    The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
    Cryptography and Public Key Infrastructure on the Internet
    Cryptography and Public Key Infrastructure on the Internet
    Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

    * Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
    ...
    Network Security Evaluation: Using the NSA IEM
    Network Security Evaluation: Using the NSA IEM
    Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes
    The Shellcoder's Handbook: Discovering and Exploiting Security Holes
    The black hats have kept up with security enhancements. Have you?

    In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

    Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy