Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Perl (3rd Edition)
Programming Perl (3rd Edition)
Perl is a powerful interpreted programming language that has matured steadily since it first appeared in 1988. The first edition of this book, Programming Perl, hit the shelves in 1990, and was quickly adopted as the undisputed Bible of the language. Since then, Perl has grown with the times, and so has this book. Programming...
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
Mike Meyers' CompTIA Network+ Certification Passport, Third Edition
What do you mean, you don’t have a passport? Why, it’s sitting right in your hands, even as you read! This book is your passport to a very special place.You’re about to begin a journey,my friend: a journey toward that magical place called certification! You don’t need a ticket, you don’t need a suitcase—just...
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
Microsoft  Windows 7 Your Way: Speed Up and Customize Window
Microsoft Windows 7 Your Way: Speed Up and Customize Window

Want to make Windows 7 run faster, smarter, easier, better? Want to personalize Windows to look and act the way you want it to? Want to get
more efficient and ditch all those Windows hassles? You don’t need
a Ph.D in computer science or expensive upgrades. All you need is this book!

...
The Book of Xen: A Practical Guide for the System Administrator
The Book of Xen: A Practical Guide for the System Administrator
Virtualization is cool. I’ve always had a soft spot for virtualization, since as a lifelong sysadmin I get pretty tired of the endless fine-tuning that goes into building a successful network “host.” Especially when that fine-tuning evolves into upgrades involving screwdrivers, recabling, and dust.

While Xen
...
Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an...

Hacking Vim 7.2
Hacking Vim 7.2

Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.

This book contains examples that cover...

Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac...

Ubuntu: Powerful Hacks and Customizations
Ubuntu: Powerful Hacks and Customizations

Tune, tweak, and change the popular Ubuntu Linux operating system!

Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops, and servers, and is used by millions of people around the world. This book provides you with practical hacks and tips that are not readily available online,...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy