Home | Amazing | Today | Tags | Publishers | Years | Search 
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The thrilling memoir of the world's most wanted computer hacker

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed
...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

Bring your electronic inventions to life!

"This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com

Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with...

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
C Programming for the PIC Microcontroller: Demystify Coding with Embedded Programming
C Programming for the PIC Microcontroller: Demystify Coding with Embedded Programming
Go beyond the jigsaw approach of just using blocks of code you don’t understand and become a programmer who really understands how your code works. 

Starting with the fundamentals on C programming, this book walks you through where the C language fits with microcontrollers. Next, you'll see how to...
Soft Commutation Isolated DC-DC Converters (Power Systems)
Soft Commutation Isolated DC-DC Converters (Power Systems)
This book describes the operation and analysis of soft-commutated isolated DC–DC converters used in the design of high efficiency and high power density equipment. It explains the basic principles behind first- and second-order circuits with power switches to enable readers to understand the importance of these converters in high...
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs

Learn how to quickly set up the test automation tool WebdriverIO, one of the major Node.js-based test frameworks. Software testing is here to stay, and an integral part of this is test automation. Dive into the amazing possibilities that WebDriverIO offers to automate browser interactions for a user of any web application. 

...
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
   
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy