|
|
|
|
Keynote Fast & EasyKeynote is a presentation graphics program created by Apple. With Keynote, you can create and deliver impressive slideshows, even if you are not a computer whiz. And because Keynote costs only $99—a steal for a business computing application these days—the program makes it affordable for professionals in all... | | Brute Force: Cracking the Data Encryption StandardIn the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... | | |
|
Webster's New World Hacker DictionaryThe comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital... | | Steal This File Sharing Book
Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song... | | The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that... |
|
|
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... | | Oracle 11g Anti-Hacker's Cookbook
When I first became aware of Adrian Neagu's intent to author a book on Oracle security, I sent
him a congratulatory note. This is an important subject area, and I felt a special need to pass
on my best wishes. His first book IBM DB2 9.7 Advanced Administration Cookbook, Packt
Publishing, had a chapter devoted to database... | | Secrets of the Playstation PortableWith over 13 million shipped, the Sony PlayStation Portable, or PSP, is one of the fastest selling game consoles in history. In this essential guide, gaming expert Joel Durham, Jr. shows readers how to get the most out of this revolutionary handheld game console. After an initial tour around the interface, Joel will introduce the readers to the... |
|
|
Result Page: 5 4 3 2 1 |