Home | Amazing | Today | Tags | Publishers | Years | Search 
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

The world of hacking is a world of pain and frustration. Frustration for the hacker as he tries to figure out how to break the latest and greatest security device, and pain for the manufacturer or corporation that made or was relying on that device.

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...

Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

Switching to a Mac For Dummies
Switching to a Mac For Dummies

Maybe you love your iPhone or iPod and are curious about other Apple products. Maybe you’ve had one virus scare too many and are fed up with Windows. Maybe the daunting prospect of upgrading to Windows 7 has made you open to other possibilities. Maybe you’re a Mac fan who wants to show a friend how easy and productive Macs...

Digital System Design with VHDL (2nd Edition)
Digital System Design with VHDL (2nd Edition)

When the first edition of this book was published, the idea of combining a text on digital design with one on VHDL seemed novel. At about the same time, several other books with similar themes were published. This book has now been adopted by several universities as a core text. Moreover, the first edition has now been translated into...

From Bash to Z Shell: Conquering the Command Line
From Bash to Z Shell: Conquering the Command Line

A shell is a sophisticated way to control your computer—Unix, Linux, Microsoft Windows, Mac OS X, and others. If you do more than the most basic operations, you can do many of them more powerfully and quickly with a shell and your keyboard than by using a mouse.

The history of shells goes back some 30 years. In the early...

Beginning Android 3
Beginning Android 3

Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars and all sort of other places as well. However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android will probably be associated mostly with smartphones for...

Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)
Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)

Over the course of the past twenty years I have learned many things relevant to this book while working in high-energy physics. As everyone in this field in the yearly to mid-90s, I was analyzing experimental data collected by particle colliders using the FORTRAN programming language. Then, gradually, I moved to C++ coding following...

Android Recipes: A Problem-Solution Approach
Android Recipes: A Problem-Solution Approach

Android is hot, and many people are developing Android applications (apps for short). Perhaps you would also like to develop apps, but are unsure about how to get started. Although you could study Google’s online Android Developer’s Guide (http://developer.android.com/guide/index.html) to acquire the needed knowledge, you...

CryENGINE 3 Cookbook
CryENGINE 3 Cookbook

With the overall complexity involved in creating games becoming exceedingly difficult and expensive with every successive console generation, many game developers have turned to middleware engines, such as the CryENGINE, that offer a complete pipeline for the game development process. CryENGINE is a perfect fit for most developers as it...

Functional Programming in C#: Classic Programming Techniques for Modern Projects (Wrox Programmer to Programmer)
Functional Programming in C#: Classic Programming Techniques for Modern Projects (Wrox Programmer to Programmer)

FUNCTIONAL PROGRAMMING is an important paradigm of programming that looks back on a long history. The subject has always been very relevant to people who teach others how to program — the clean and logical concepts of functional programming lend themselves especially well to teaching. Certain industries that use computers and self...

Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)
Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)

Since the World Wide Web became widely available in the mid 1990s, Web-based applications have developed rapidly. The Web has come to be used by a range of people for many different purposes, including online banking, e-commerce, distance education, social networking, data sharing, collaborating on team projects, and...

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

I suppose there are several questions that may be running through your head as you contemplate reading this book: Who is the intended audience for this book? How is this book different from book ‘x’ (insert your favorite title here)? Why should I buy it? Because these are all fair questions and I am asking you to plunk...

Result Page: 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy