Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP

Search engine optimization (SEO) is not only the job of the marketing department. It must be considered from a web site's inception and throughout its lifetime by you, the web site developer. Making changes to the architecture of a web site and modifying presentation techniques...

Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Das kleine Buch der Zahlen: Vom Abzählen bis zur Kryptographie (German Edition)
Das kleine Buch der Zahlen: Vom Abzählen bis zur Kryptographie (German Edition)

Seit Jahrhunderten sind Menschen fasziniert von Zahlen. Zahlen sind jedem vertraut und bilden ein wesentliches Fundament für unser Verständnis der Welt. Und doch ist uns das Zahlensystem nicht „einfach so“ gegeben, sondern es hat sich über Jahrtausende entwickelt. Trotz aller Fortschritte kann auch heute noch jedes...

MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
Unix Unleashed: Internet Edition
Unix Unleashed: Internet Edition
The first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Professional Linux Programming
Professional Linux Programming
By tapping the strengths of the open-source movement, developers can write custom Linux software without spending a dime on licensing fees. Aimed at the experienced C/C++ programmer, Professional Linux Programming provides a wide-ranging and hands-on guide to the different pieces of the puzzle that are required to program successfully...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy