Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Firefox Hacks
Firefox Hacks

Firefox Hacks is ideal for power users who want to maximize the effectiveness of Firefox, the next-generation web browser that is quickly gaining in popularity. This highly-focused book offers all the valuable tips and tools you need to enjoy a superior and safer browsing experience. Learn how...

Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and...
Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Ruby on Rails Bible
Ruby on Rails Bible
Thanks to the explosive growth in popularity of the Rails framework, the equally popular Ruby programming language now has a great place to hang its hat. The powerful combination of the two provides the perfect toolset to create Web applications that feature concise code, clean syntax, and easy maintenance. This must-have book is your best guide on...
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition

This comprehensive, hands-on study guide gives you complete coverage of all objectives for the Red Hat Certified Linux Engineer exam (RH302), hundreds of review questions, and hands-on lab exercises.

Get the book that shows you not only what—but how—to study

  • 100% complete...
IBM Xseries 455 Planning And Installation Guide
IBM Xseries 455 Planning And Installation Guide
The IBM eServer xSeries 455 is the second-generation Enterprise X-Architecture server using the 64-bit IBM XA-64 chipset and the Intel Itanium 2 processor. Unlike the x450, its predecessor, the x455 supports the merging of four server chassis to form a single 16-way image, providing even greater expandability and investment protection.
...
Black Hat Physical Device Security: Exploiting Hardware and Software
Black Hat Physical Device Security: Exploiting Hardware and Software
Attacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,...
Numerical Python: Scientific Computing and Data Science Applications with Numpy, SciPy and Matplotlib
Numerical Python: Scientific Computing and Data Science Applications with Numpy, SciPy and Matplotlib

Leverage the numerical and mathematical modules in Python and its standard library as well as popular open source numerical Python packages like NumPy, SciPy, FiPy, matplotlib and more. This fully revised edition, updated with the latest details of each package and changes to Jupyter projects, demonstrates how to numerically compute...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy