Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

Ubuntu Kung Fu: Tips, Tricks, Hints, and Hacks
Ubuntu Kung Fu: Tips, Tricks, Hints, and Hacks
This book was born out of an experiment carried out when Ubuntu 6.06 was released in 2006. Back then Ubuntu was rougher around the edges than it is today. Getting MP3 files to play took some effort. Only a handful of wifi cards worked out of the box and the rest had to be wrangled into working.

So I wrote 25 tips to get Ubuntu working
...
Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

iPad: The Missing Manual (Missing Manuals)
iPad: The Missing Manual (Missing Manuals)

Super-fast processors, streamlined Internet access, and free productivity and entertainment apps make Apple’s new iPads the hottest tablets around. But to get the most from them, you need an owner’s manual up to the task. That’s where this bestselling guide comes in. You’ll quickly learn how to import, create,...

IP Location
IP Location

In today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,...

BlackBerry Storm 2 Made Simple: For BlackBerry Storm & Storm 2
BlackBerry Storm 2 Made Simple: For BlackBerry Storm & Storm 2

The sleek BlackBerry Storm is more than good looks—it also boasts a number of powerful features, including advanced SurePress typing technology, WiFi access, and video recording capabilities. With BlackBerry Storm 2 Made Simple, you’ll explore all the features and uncover valuable techniques—from emailing and...

Wi-Fi for the Enterprise : Maximizing 802.11 For Business
Wi-Fi for the Enterprise : Maximizing 802.11 For Business
PUT WiFi TO WORK

With his potent gift for clearly explaining technology, networking guru/author Nathan J. Muller presents a powerful set of tools for making the right decisions, the best moves, and extracting maximum benefits from WiFi in the workplace. In WiFi for the Enterprise, he shares his expertise on equipment,...

Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Simple and Usable Web, Mobile, and Interaction Design (Voices That Matter)
Simple and Usable Web, Mobile, and Interaction Design (Voices That Matter)

In a complex world, products that are easy to use win favor with consumers. This is the first book on the topic of simplicity aimed specifically at interaction designers. It shows how to drill down and simplify user experiences when designing digital tools and applications. It begins by explaining why simplicity is attractive, explores the...

Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy