Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking MySpace: Mods and Customizations to make MySpace Your Space
Hacking MySpace: Mods and Customizations to make MySpace Your Space
There are over 90 million profiles on MySpace. How do you makeYOURS stand out? You use these programming tricks and tech-niques to tweak the look, feel, and content of your profile. You getthe inside scoop on hotdesign and photography.You maximize the effects of HTML and CSS. And if you happen to be amusician, you check outChapter 30 to see...
Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Microsoft  Windows  XP Inside Out (2nd Edition)
Microsoft Windows XP Inside Out (2nd Edition)
Ed Bott and Carl Siechert have combined their considerable talents for producing user-level documentation in creating Microsoft Windows XP Inside Out. One of the most carefully researched books on Windows XP to date, this large volume has all the information and procedures most everyday users of the operating system will want. With its...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Java Servlet Programming, 2nd Edition
Java Servlet Programming, 2nd Edition

Since I wrote the first edition of this book, servlets and the server-side Java platform have grown in popularity beyond everyone's wildest expectations. Adoption is pervasive. Web server vendors now offer servlet support as a standard feature. The Java 2, Enterprise Edition (J2EE), specification has included servlets...

Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000
For Windows 2003 SP1, Windows XP SP2, and Windows 2000

This fully updated third edition of Group Policy, Profiles, and IntelliMirror provides all the instruction and insight you need to take full advantage of your Active Directory with GPMC and other Group Policy tools. You'll also learn techniques for implementing...

Secrets of the iPod
Secrets of the iPod
Everyone loves the iPod (though for a lot of us it's a fairly abstract love, given the gizmo's sticker price). In Secrets of the iPod, Christopher Breen--you may know him from TechTV--does a brain-dump on the latest version of the iPod. His coverage is complete, easy to read, and clearly reflects the personal experience of a man who likes...
The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing

This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required...

Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
Beginning CSS Web Development: From Novice to Professional
Beginning CSS Web Development: From Novice to Professional

Cascading Style Sheets (CSS) are one of the most important technologies on the web today. They give web developers the power to style their web sites so those sites are usable, compact, good looking, consistently displayable, and quick and efficient to change if so desired.

There are many books out there on CSS, but Beginning CSS Web...

Hacking the Cable Modem: What Cable Companies Don't Want You to Know
Hacking the Cable Modem: What Cable Companies Don't Want You to Know
In the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy