Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Windows 95 System Programming Secrets
Windows 95 System Programming Secrets
This is no mere "How do I write a Windows 95 app?" manual. Windows 95 System Programming SECRETS reveals the hard-core technical information you need to know in order to tap the true power of 32-bit programming for Windows 95. Written for the programmer who's done at least some Windows 3.x programming,...
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

“Part John le Carré and more parts Michael Crichton . . . spellbinding.” –The New Yorker

From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a
...

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Formulas and Functions: Microsoft Excel 2010
Formulas and Functions: Microsoft Excel 2010

MASTER CORE EXCEL 2010 TOOLS FOR BUILDING POWERFUL, RELIABLE SPREADSHEETS!

 

Excel expert Paul McFedries shows how to use Excel 2010’s core features to solve problems and get the answers you need! Using real-world examples, McFedries helps you get...

Confessions of an Economic Hit Man
Confessions of an Economic Hit Man

Confessions of an Economic Hit Man reveals a game that, according to John Perkins, is "as old as Empire" but has taken on new and terrifying dimensions in an era of globalization. And Perkins should know. For many years he worked for an international consulting firm where his main job was to convince LDCs (less developed...

Windows Presentation Foundation Unleashed (WPF)
Windows Presentation Foundation Unleashed (WPF)
Thank you for picking up Windows Presentation Foundation Unleashed! To avoid unsatisfied customers, I want to clarify that this is not a book about Microsoft PowerPoint (which many people consider to be the foundation of Windows presentations)! Windows Presentation Foundation (WPF) is Microsoft’s latest technology for creating graphical user...
Wild Bill: The True Story of the American Frontier's First Gunfighter
Wild Bill: The True Story of the American Frontier's First Gunfighter

The definitive true story of Wild Bill, the first lawman of the Wild West, by the #1 New York Times bestselling author of Dodge City.

In July 1865, "Wild Bill" Hickok shot and killed Davis Tutt in Springfield, MO?the first quick-draw duel on the frontier.
...

Teach Yourself VISUALLY Windows Vista (Tech)
Teach Yourself VISUALLY Windows Vista (Tech)
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 140 Windows Vista tasks. Each task-based spread includes easy, visual directions for...
Teach Yourself VISUALLY Computers
Teach Yourself VISUALLY Computers
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 135 basic computer tasks. Each task-based spread includes easy, visual directions...
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the wonderful time in which you currently find yourself. To be alive and learning right now—when there are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written with passion visible on...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy