Running Linux, Fourth Edition This is a book about Linux, a free, open source operating system that's changing the world of
computing. In this book, we show how you can completely change the way you work with
computers by exploring a powerful and free operating system. Linux goes against
the traditional computing mainstream, being developed by a loosely organized...
Hack I.T.: Security Through Penetration Testing Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Australia For Dummies (Dummies Travel) From the Outback to the Great Barrier Reef to glorious, sophisticated cities like Sydney, this guide helps you find the Australian adventures and attractions that are right for you, whether you’d like to cuddle a koala, explore a shipwreck, swim with whale sharks, or climb the Sydney Harbour Bridge. It gives you the scoop on:
... American History Through Literature - 1820-1870 This A-Z, cross-referenced and illustrated title provides a unique overview of the critical period that spans the early national era through the Civil War, and which witnessed the birth of a truly American literature. The set features more than 250 survey entries. Subjects include: political topics (Manifest Destiny, Underground Railroad); ideas in... Steal This Computer Book 3: What They Won't Tell You About the Internet This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting...
|Result Page: 7 6 5 4 3 2 1 |