Home | Amazing | Today | Tags | Publishers | Years | Search 
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Advanced Linux 3D Graphics Programming (With CD-ROM)
Advanced Linux 3D Graphics Programming (With CD-ROM)
Advanced Linux 3D Graphics Programming builds upon the foundation set in Norman Lin's Linux 3D Graphics Programming. This second volume provides programmers who are experienced in both Linux and fundamental 3D graphics concepts with a well-rounded perspective on 3D theory and practice within the context of programming larger interactive 3D...
AppleScript in a Nutshell: A Desktop Quick Reference
AppleScript in a Nutshell: A Desktop Quick Reference
AppleScript in a Nutshell is the first complete reference to AppleScript, the popular programming language that gives both power users and sophisticated enterprise customers the important ability to automate repetitive tasks and customize applications. As the Macintosh continues to expand and solidify...
Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Encyclopedia of Urban Legends
Encyclopedia of Urban Legends

Any folklorist who saw the 1998 Columbia Pictures film Urban Legend will probably remember the library scene for its depiction of one aspect of folklore research. In this scene the beautiful student Natalie (played by Alicia Witt) suspects that recent campus mayhem was inspired by urban legends, the same kind of stories...

Cisco IOS Access Lists
Cisco IOS Access Lists
Cisco IOS Access Lists takes a methodical approach to access lists and their capabilities, and is ideal for administrators of Cisco equipment who have configured access lists before but feel as if they're not taking full advantage of their capabilities (which, author Jeff Sedayao proves, extend well beyond security). Much of what Sedayao...
Programming Web Services with XML-RPC (O'Reilly Internet Series)
Programming Web Services with XML-RPC (O'Reilly Internet Series)
XML-RPC, a simple yet powerful system built on XML and HTTP, lets developers connect programs running on different computers with a minimum of fuss. Java programs can talk to Perl scripts, which can talk to ASP applications, and so on. With XML-RPC, developers can provide access to functionality without having to worry about the system on the other...
Encyclopedia of Prophecy
Encyclopedia of Prophecy
Worldwide in scope and dating from biblical times, though its thrust is by no means exclusively religious, this encyclopedia ranges widely in its A-to-Z listing of entries. Among them are "apocalypse," "Edgar Cayce," "end of the world," "Napoleon," "premonitions," "sphinx," and...
IBM Certification Study Guide AIX Problem Determination Tools and Techniques
IBM Certification Study Guide AIX Problem Determination Tools and Techniques
The AIX and RS/6000 Certifications, offered through the Professional Certification Program from IBM, are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of the AIX operating system and RS/6000 and pSeries servers. A complete set of professional certifications are...
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
IBM Certification Study Guide AIX Installation and System Recovery
IBM Certification Study Guide AIX Installation and System Recovery
The AIX and RS/6000 Certifications, offered through the Professional Certification Program from IBM, are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of the AIX operating system and RS/6000 and pSeries servers. A complete set of professional certifications are...
ADO : ActiveX Data Objects
ADO : ActiveX Data Objects
Getting data across platforms and formats is a cornerstone of present-day applications development. ADO: ActiveX Data Objects is both an introduction and a complete reference to ADO (ActiveX Data Objects), Microsoft's universal data access solution. You'll learn how to easily access data in multiple formats--such as email messages,...
Result Page: Previous 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy