|
|
|
|
Nokia Smartphone HacksNokia's smartphones pack a powerful computer into a very small space. Unlike your desktop or laptop, your smallest computer can be connected to the Internet all the time, and can interact with the world around it through its camera, voice recognition, and its traditional phone keypad. Nokia smartphones combine these features with impressive storage... | | Developer's Guide to Web Application SecurityOver 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
This book defines Web application security, why it should be... | | Effective Unit Testing: A guide for Java developers
Summary
Effective Unit Testing is written to show how to write good tests—tests that are concise and to the point, expressive, useful, and maintainable. Inspired by Roy Osherove's bestselling The Art of Unit Testing, this book focuses on tools and practices specific to the Java world. It... |
|
eBay Hacks: 100 Industrial-Strength Tips and Tools, First EditionWhether you're a newcomer or longtime user, eBay Hacks will teach you to become efficient as both a buyer and seller. You'll find a wide range of topics, from monitoring the bidding process, getting refunds, and fixing photos so that sale items look their best, to in-depth tips for running a business on eBay and... | | Using Moodle: Teaching with the Popular Open Source Course Management SystemDeveloped by an extremely active open source community, Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities and for supplementing face-to-face learning. Used in more than 115 countries and supporting over 60 languages, Moodle can scale from a single-teacher site to a 40,000- ... | | Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... |
|
Hacking Mac OS X Tiger : Serious Hacks, Mods and CustomizationsThis serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:
- Shows you how to speed it up, lock it down, or pull back the curtains.
- Dives into default system settings,...
| | | | The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect... |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |