Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Phones For Dummies (For Dummies (Lifestyle))
Android Phones For Dummies (For Dummies (Lifestyle))

Your full-color guide to putting your Android to work for you

Your smartphone is essentially your lifeline—so it's no wonder you chose a simple-to-use, fun-to-customize, and easy-to-operate Android. Cutting through intimidating jargon and covering all the features you need to know about your Android phone, this...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
USB Complete: Everything You Need to Develop Custom USB Peripherals (Complete Guides series)
USB Complete: Everything You Need to Develop Custom USB Peripherals (Complete Guides series)
Now in its third edition, this developer's guide to the Universal Serial Bus (USB) interface covers all aspects of project development, including device programming and host application software. This book shows how to transform the information in the USB 3.0 specifications into functioning devices and application software that communicates with...
Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
Essential Linux Device Drivers (Prentice Hall Open Source Software Development Series)
“Probably the most wide ranging and complete Linux device driver book I’ve read.”

--Alan Cox, Linux Guru and Key Kernel Developer

 

“Very comprehensive and detailed, covering almost every single Linux device driver type.”

...
Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
When I wrote the first edition of this book, the RS-232 serial port was the workhorse of PC interfaces. Modems and scores of other peripherals connected to PCs via the serial ports that were present on every machine.

When the Universal Serial Bus (USB) took hold in the late 1990s, many predicted that serial ports would soon be obsolete.
...
USB Complete: The Developer's Guide (Complete Guides series)
USB Complete: The Developer's Guide (Complete Guides series)
This updated edition of the best-selling developer's guide to the Universal Serial Bus (USB) interface covers all aspects of project development, including hardware design, device firmware, and host application software.

Topics include how to choose a device controller chip, how to write device firmware for USB...

Getting Started with Raspberry Pi Zero
Getting Started with Raspberry Pi Zero

Key Features

  • Get started with Raspberry Pi Zero and put all of its exciting features to use
  • Create fun games and programs with little or no programming experience
  • Learn to use this super-tiny PC to control hardware and software for work, play, and everything else

Book...

Using Yocto Project with BeagleBone Black
Using Yocto Project with BeagleBone Black

Unleash the power of the BeagleBone Black embedded platform with Yocto Project

About This Book

  • Build real world embedded system projects using the impressive combination of Yocto Project and Beaglebone Black
  • Learn how to effectively add multimedia to your board and save time by exploiting...
Debugging Linux Systems
Debugging Linux Systems

Debugging Linux Systems discusses the main tools available today to debug 2.6 Linux Kernels. We start by exploring the seemingly esoteric operations of the Kernel Debugger (KDB), Kernel GNU DeBugger (KGDB), the plain GNU DeBugger (GDB), and JTAG debuggers. We then investigate Kernel Probes, a feature that lets you intrude into a kernel...

Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an...

Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy