Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Arduino Robot Bonanza
Arduino Robot Bonanza

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Create high-tech walking, talking, and thinking robots

"McComb hasn’t missed a beat. It’s an absolute...

Amazon Web Services for Mobile Developers: Building Apps with AWS
Amazon Web Services for Mobile Developers: Building Apps with AWS

A practical, real-world introduction to AWS tools and concepts

Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and...

Head First Statistics
Head First Statistics
Wouldn't it be great if there were a statistics book that made histograms, probability distributions, and chi square analysis more enjoyable than going to the dentist? Head First Statistics brings this typically dry subject to life, teaching you everything you want and need to know about statistics through engaging, interactive, and...
Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

The R Book
The R Book

R is a high-level language and an environment for data analysis and graphics. The design of R was heavily influenced by two existing languages: Becker, Chambers and Wilks’ S and Sussman’s Scheme. The resulting language is very similar in appearance to S, but the underlying implementation and semantics are derived from Scheme. This...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Complete Idiot's Guide to Amazing Sex
The Complete Idiot's Guide to Amazing Sex
You're no idiot, of course! You know there's more to sex than the missionary position, that oral sex doesn't mean talking about sex, and that safe sex doesn't mean doing it in a bank vault. But when it comes to having a truly amazing sexual encounter, you feel like there's just no sizzle in your sex life. You can make things hot! The Complete...
Ways of Thinking, Ways of Seeing: Mathematical and other Modelling in Engineering and Technology (Automation, Collaboration, & E-Services)
Ways of Thinking, Ways of Seeing: Mathematical and other Modelling in Engineering and Technology (Automation, Collaboration, & E-Services)

This fascinating book examines some of the characteristics of technological/engineering models that are likely to be unfamiliar to those who are interested primarily in the history and philosophy of science and mathematics, and which differentiate technological models from scientific and mathematical ones. Themes that are highlighted...

Network Analysis Using Wireshark Cookbook
Network Analysis Using Wireshark Cookbook

This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues.

Overview

  • Place Wireshark in your network and configure it for...
Effective Programming: More Than Writing Code
Effective Programming: More Than Writing Code

ABOUT THE BOOK Jeff Atwood began the Coding Horror blog in 2004, and is convinced that it changed his life. He needed a way to keep track of software development over time - whatever he was thinking about or working on. He researched subjects he found interesting, then documented his research with a public blog post, which he could easily...

Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)
Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)

Let’s begin with a quick glimpse into a typical day at a company:

There you are at your desk, wanting to talk with your colleague Steve in another office about a new project you need his help on. You turn to your laptop, switch to a software program, and look at Steve’s presence info. The little bubble next to...

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy