|
|
|
|
Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... | | The Old New Thing: Practical Development Throughout the Evolution of WindowsWhy does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called "hives"?
Many of Windows' quirks have perfectly logical explanations, rooted in... | | Out of Joint: A Private and Public Story of Arthritis (American Lives)
She begins, in the morning, by casing her joints: Can her ankles take the stairs? Will her fingers open a jar? Peel an orange? But it was not always this way for Mary Felstiner, who went to bed one night an active professional and healthy young mother, and woke the next morning literally out of joint. With wrists and elbows no longer ... |
|
Hacking Photoshop CS2You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command... | | Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... | | |
|
|
Home Closing Checklist A concise, quick-reference guide to save money and headaches when closing on a home
Fraught with arcane rituals, hidden traps and pitfalls, and confusing legal mumbo jumbo, the closing can be the most harrowing part of the home buying... | | Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... | | iPad Made Simple
Get the most out of your iPad with iPad Made Simple—learn all the key features, understand what’s new, and utilize dozens of time-saving tips and tricks. This book includes over 740 pages of easy-to-read instructions and over 1,000 carefully annotated screen shots to guide you to iPad mastery.
With iPad... |
|
|
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |