|
|
|
|
|
Hacking VoIP: Protocols, Attacks, and CountermeasuresVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,... | | Learning Pentesting for Android Devices
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the... | | Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore... |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through... | | Ultrasonography of the Pancreas: Imaging and Pathologic Correlations
Ultrasonography (US) has long been considered an important diagnostic imaging modality for investigation of the pancreas despite certain significant and well-known limitations. Indeed, in many countries US represents the first step in the diagnostic algorithm for pancreatic pathologies. Recent years have witnessed major advances in... | | Penetration Testing with BackBox
This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.
Overview
-
Experience the real world of penetration testing with Backbox Linux using...
|
|
Management of Erectile Dysfunction in Clinical Practice
Management of Erectile Dysfunction in Clinical Practice is a short guide to erectile dysfunction (ED) and its management covering normal function and dysfunction, assessment, treatment options and interventions. ED is a symptom, not a disease and will have underlying causes such as hypertension, coronary artery disease, diabetes,... | | Pounder's Marine Diesel Engines and Gas Turbines, Ninth EditionSince its first appearance in 1950, Pounder's Marine Diesel Engines has served seagoing engineers, students of the Certificates of Competency examinations and the marine engineering industry throughout the world. Each new edition has noted the changes in engine design and the influence of new technology and economic needs on the marine... | | Java EE 7 Essentials
Get up to speed on the principal technologies in the Java Platform, Enterprise Edition 7, and learn how the latest version embraces HTML5, focuses on higher productivity, and provides functionality to meet enterprise demands. Written by Arun Gupta, a key member of the Java EE team, this book provides a chapter-by-chapter survey of... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |