Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Wireless Networks For Dummies (Computer/Tech)
Hacking Wireless Networks For Dummies (Computer/Tech)
Become a cyber-hero — know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
—Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient — not...

Linux Server Hacks
Linux Server Hacks
A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well...
Silverlight 1.0
Silverlight 1.0
Silverlight—the hot new web technology based on the powerful WPF graphics platform that ships with Windows Vista—is the web developer's choice for creating cross-platform interactive applications that work in multiple browsers. This one-of-a-kindreference shows you, with full-color illustrations, how to create rich interactive apps with...
Mind Hacks : Tips & Tricks for Using Your Brain
Mind Hacks : Tips & Tricks for Using Your Brain
 This exploration into the moment-by-moment works of the brain uses cognitive neuroscience to present experiments, tricks, and tips related to vision, motor skills, attention, cognition, subliminal perception. Each "hack" examines specific operations of the brain. By seeing how the brain responds, you'll learn more about how the...
Mind Performance Projects for the Evil Genius: 19 Brain-Bending Bio Hacks
Mind Performance Projects for the Evil Genius: 19 Brain-Bending Bio Hacks

Have some evil fun inside your head!

This wickedly inventive guide offers 19 build-it-yourself projects featuring high-tech devices that can map, manipulate, and even improve the greatest computer on earth-the human brain. Every project inside Mind Performance Projects for the Evil Genius is perfectly safe and...

Online Investing Hacks : 100 Industrial-Strength Tips & Tools
Online Investing Hacks : 100 Industrial-Strength Tips & Tools
Individual investors have become more computer-literate and technology-dependent than ever before. Whether you're looking for suitable investments, studying alternatives, or managing your portfolios, you need data. The Internet can be a goldmine of financial data and research, but today's online investors also use spreadsheets, databases,...
Hacking MySpace: Mods and Customizations to make MySpace Your Space
Hacking MySpace: Mods and Customizations to make MySpace Your Space
There are over 90 million profiles on MySpace. How do you makeYOURS stand out? You use these programming tricks and tech-niques to tweak the look, feel, and content of your profile. You getthe inside scoop on hotdesign and photography.You maximize the effects of HTML and CSS. And if you happen to be amusician, you check outChapter 30 to see...
The Unauthorized Halo 2 Battle Guide: Advanced Combat Techniques
The Unauthorized Halo 2 Battle Guide: Advanced Combat Techniques
Contents of this Battle Guide
This Battle Guide is designed to give you an edge by enabling you to learn about and master techniques and strategies organized by specific topics. This enables you to jump around and get the information you want when you want it. You
...
Robot Builder's Bonanza, Third Edition (Robot Builder's Bonanza)
Robot Builder's Bonanza, Third Edition (Robot Builder's Bonanza)

THE BEST AND BIGGEST ROBOTICS BOOK ON THE BLOCK—NOW BETTER THAN EVER—SUPERCHARGED WITH TWO TOP ROBOTICS AUTHORS!

Thousands of robot hobbyists -- and robots -- grew up on the first two editions on this book. Now Gordon McComb has partnered with fellow robotics enthusiast Myke Predko -- and together they've...

Seven Deadliest Wireless Technologies Attacks
Seven Deadliest Wireless Technologies Attacks

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more...

Amazon Hacks : 100 Industrial-Strength Tips & Tools
Amazon Hacks : 100 Industrial-Strength Tips & Tools

When Amazon.com opened its virtual doors on July 16, 1995, it was just one among several online booksellers. As Amazon embraced the technology to categorize and display millions of books in one space, people embraced the ability to search for and purchase books in a new way. The experience of building a successful business based...

Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy