Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
Become an expert in cracking WiFi...
Getting Started with Raspberry Pi Zero
Get started with Raspberry Pi Zero and put all of its exciting features to use
Create fun games and programs with little or no programming experience
Learn to use this super-tiny PC to control hardware and software for work, play, and everything else
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.
If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...
Embedded Systems: Desktop Integration (Wordware Applications Library) In this book, we design a thermostat that interfaces to a host
system through RS-232, USB, and Ethernet. To make things fun,
the device layer and user applications have to run on Windows,
Linux, and FreeBSD. We build three prototype thermostats using
the BASIC Stamp, PIC Microcontroller, and PSOC Microcontroller.
Hacking BlackBerry: ExtremeTech Here's an even better way to get your BlackBerry fix
Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or...
Using Yocto Project with BeagleBone Black
Unleash the power of the BeagleBone Black embedded platform with Yocto Project
About This Book
Build real world embedded system projects using the impressive combination of Yocto Project and Beaglebone Black
Learn how to effectively add multimedia to your board and save time by exploiting...
Advanced Raspberry Pi: Raspbian Linux and GPIO Integration
Jump right into the pro-level guts of the Raspberry Pi with complete schematics and detailed hardware explanations as your guide. You'll tinker with runlevels, reporting voltages and temperatures, and work on a variety of project examples that you can tune for your own project ideas..
This book is fully updated...
Digital Design and Computer Architecture, Second Edition
Digital Design and Computer Architecture takes a unique and modern approach to digital design. Beginning with digital logic gates and progressing to the design of combinational and sequential circuits, Harris and Harris use these fundamental building blocks as the basis for what follows: the design of an actual MIPS processor....
Kali Linux CTF Blueprints
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
About This Book
Put the skills of the experts to the test with these tough and customisable pentesting projects
Develop each challenge to suit your specific...
Maran Illustrated Computers Guided Tour Produced by the award-winning maranGraphics Group, "Maran Illustrated™ Computers – Guided Tour" is a valuable resource for all readers, regardless of experience. "Maran Illustrated™ Computers – Guided Tour" is packed with information useful to readers who are interested in purchasing their first computer... Buying a Computer for Dummies, 2005 Edition CPU, Ghz, Mhz, DIMMS, RAM, ROM, AGP, ISA, PCI, USB, CRT, LCD, NIC, CCD, CIS, DP, Kbps. What do all of these acronyms mean?
Are you baffled by computer technology and technology? Intimidated by computer salespeople who grimace or grin when you say “gizmo?” Buying a Computer For Dummies 2005 Edition gives you the ABCs of...
|Result Page: 10 9 8 7 6 5 4 3 2 1 |