|
|
|
|
|
|
| | | | Google Hacking for Penetration TestersGoogle Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious... |
|
A Practical Introduction to Computer Architecture (Texts in Computer Science)This book blends traditional teaching approaches with the use of mathematics, together with the use of a hardware description language and a concrete processor as vehicles for "hands-on" modelling and experimenting with digital logic and processor design. This unique approach encourages readers to derive their own conclusions via... | | | | |
|
|
Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 |