Descendants 2 | Get Down | Janel Moloney
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

DarkMarket: Cyberthieves, Cybercops and You
DarkMarket: Cyberthieves, Cybercops and You

"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." --Roberto Saviano, author of Gommorah

The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a
...

Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life (Life and Mind: Philosophical Issues in Biology and Psychology)
Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life (Life and Mind: Philosophical Issues in Biology and Psychology)

This new edition of the widely read Evolution in Four Dimensions has been revised to reflect the spate of new discoveries in biology since the book was first published in 2005, offering corrections, an updated bibliography, and a substantial new chapter. Eva Jablonka and Marion Lamb's pioneering argument proposes that there is more...

Oracle Insights: Tales of the Oak Table
Oracle Insights: Tales of the Oak Table
OvER THE PAST fifteen years I have worked for Oracle Corporation, and with many customers who were keen to find the limitations of the (then) current Oracle database on the latest and greatest hardware platforms of the day.

These customers have demanded ever increasing database performance at what seems a
...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Bone Resorption (Topics in Bone Biology)
Bone Resorption (Topics in Bone Biology)
Bone Resorption, the second volume of the series Topics in Bone Biology, is centered on the osteoclast, the bone-resorbing cell. The volume thus complements the first volume of the series, Bone Formation, which discussed origin, function, and pathology of the bone-forming cell, the osteoblast.Both volumes are addressed to...
Yeast as a Tool in Cancer Research
Yeast as a Tool in Cancer Research

Leland H. Hartwell Director, Fred Hutchinson Cancer Research Center, Nobel Laureate for Medicine, 2001 Yeast has proved to be the most useful single-celled organism for studying the fundamental aspects of cell biology. Resources are now available for yeast that greatly simplify and empower new investigations, like the presence of strains with...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

The Mental Health Professional and the New Technologies: A Handbook for Practice Today
The Mental Health Professional and the New Technologies: A Handbook for Practice Today
Technology, used for both informational and telecommunication purposes, is becoming one of the most important factors in the future of health care delivery. One can see the oncoming change simply by surfing the Internet and looking at the proliferation of health-related Web sites. The 7 million Web sites uncovered by the Alta Vista search engine...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Ultimate Journey
Ultimate Journey

In 1958, a successful businessman named Robert Mornroe began to have experiences that drastically altered his life.  Unpredictably, and without his willing it, Monroe found himself leaving his physical body to travel via a "second body" to locales far removed from the physical and spiritual realities of his life. He was...

Culture and Group Processes (Frontiers of Culture and Psychology)
Culture and Group Processes (Frontiers of Culture and Psychology)

Human beings are adapted for group living. Groups have a wide range of adaptive functions for individuals, including both material benefits of mutual aid and collective action, and subjective psychological benefits of affiliation and social identity. Recent development of cultural psychology, however, has uncovered that culture plays crucial...

Result Page: 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy