Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Digital Cameras (ExtremeTech)
Hacking Digital Cameras (ExtremeTech)
Why waste a thousand words?

Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...

The CSS Anthology: 101 Essential Tips, Tricks & Hacks
The CSS Anthology: 101 Essential Tips, Tricks & Hacks
A practical guide on CSS (Cascading Style Sheets) for professionals and novices, that can be used both as a tutorial and read cover-to-cover or as a handy and practical reference book to common problems, solutions and effects. The 2nd edition is now full-color throughout and is completely updated and revised with the latest tips & tricks. ...
Microsoft Windows XP Inside Out, Deluxe Edition
Microsoft Windows XP Inside Out, Deluxe Edition
This DELUXE EDITION reference digs even deeper into Windows XP, including all-new coverage of Service Pack 1, plus a wealth of new resources on CD-ROM. Now you get even more timesaving solutions, tips, and tools—all in concise, fast-answers format!

Think you know Microsoft Windows inside out? Think again.

For more than a...

Car PC Hacks
Car PC Hacks
A car PC or carputer is a car tricked-out with electronics for playing radio, music and DVD movies, connecting to the Internet, navigating and tracking with satellite, taking photos, and any electronic gadget a person wants in a car. All these devices are managed and controlled through a single screen or interface. The only place car PC enthusiasts...
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Hacking Windows XP (ExtremeTech)
Hacking Windows XP (ExtremeTech)
Check out the view from Steve Sinchak's Windows

Sure, Windows XP is already superior to its predecessors. But what if you could make it even better? Well, stop reading the cover and buy this book, because that’s exactly what it teaches you. This is the serious stuff–step-by-step hacks that beef up speed and security, customize...

Building Forums With Vbulletin
Building Forums With Vbulletin
vBulletin is a very popular, commercial discussion forums application. Written in PHP, it is the system of choice for many of the biggest and most popular discussion forums on the Internet.
This book takes you step by step through setting up and running your own vBulletin website. In easy-to-follow language, it will show you how to select a
...
Google Hacks: Tips & Tools for Finding and Using the World's Information
Google Hacks: Tips & Tools for Finding and Using the World's Information

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding...

Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will...

SQL Hacks
SQL Hacks

Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy