Home | Amazing | Today | Tags | Publishers | Years | Search 
The Best of Verity Stob: Highlights of Verity Stob's Famous Columns from .EXE, Dr. Dobb's Journal, and The Register
The Best of Verity Stob: Highlights of Verity Stob's Famous Columns from .EXE, Dr. Dobb's Journal, and The Register

Verity Stob is the comedienne of the programming world. She has been writing satirical chronicles of techie life since 1988. Her column first appeared in the legendary .EXE Magazine, then Dr. Dobbs' Journal, and it now graces The Register.

For the first time, the very best of Stob's...

Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made
Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made

Dwarf Fortress may be the most complex video game ever made, but all that detail makes for fascinating game play, as various elements collide in interesting and challenging ways. The trick is getting started. In this guide, Fortress geek Peter Tyson takes you through the basics of this menacing realm, and helps you overcome the...

Revolution in The Valley: The Insanely Great Story of How the Mac Was Made
Revolution in The Valley: The Insanely Great Story of How the Mac Was Made

There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Animal Rights: A Reference Handbook (Contemporary World Issues)
Animal Rights: A Reference Handbook (Contemporary World Issues)

the controversy surrounding animal rights is divisive and potentially volatile. It divides society into three unequally sized groups. The first group is comprised of animal activists who believe that all human use of animals should stop immediately. The second group is society in general, which may or...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Fiber to the Home: The New Empowerment
Fiber to the Home: The New Empowerment
A compelling treatment of FTTH

Written by telecommunications pioneer Paul Green Jr., Fiber to the Home is a comprehensive examination of the technical and social implications of fiber to the home (FTTH), the technology that extends the current fiber optic backbone to optically connect it directly to homes and offices.

Fiber to the...

Encyclopedia of Creation Myths
Encyclopedia of Creation Myths

A myth is a narrative projection of a given cultural group's sense of its sacred past and its significant relationship with the deeper powers of the surrounding world and universe. A myth is a projection of an aspect of a culture's soul. In its complex but revealing symbolism, a myth is to a culture what a dream is to an...

Running Linux, Fourth Edition
Running Linux, Fourth Edition
This is a book about Linux, a free, open source operating system that's changing the world of
computing. In this book, we show how you can completely change the way you work with
computers by exploring a powerful and free operating system. Linux goes against
the traditional computing mainstream, being developed by a loosely organized
...
Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy