|
|
|
|
Hack Proofing Your Network (Second Edition)This book is intended to teach skills that will be useful for breaking into computers. If that statement shocks you, then you probably aren’t familiar with the legitimate reasons for hacking.These reasons can be security testing, consumer advocacy and civil rights, military interests, and “hacktivist” politics;... | | Cognitive Rehabilitation in Old Age"The authors provide a comprehensive overview of important topics"--Annals, March 2001
"Gerontologists and psychologists explore concepts that could aid research into intervening to reverse or slow cognitive deficits resulting from old age, and the application of specific cognitive training strategies in natural settings.... | | Exploiting Software : How to Break CodeHow does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools,... |
|
|
|
Engineering and Technology Management Tools and ApplicationsToday engineering and technology have become important factors in global competitiveness. Under a fierce competitive environment, engineering and technology managers are forced to achieve marketable results by focusing on areas such as speed, quality, and cost. This can only be achieved through effective planning, organization,... | | Learning Pentesting for Android Devices
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the... | | Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |