Book Description
CD-ROM contains: "10,000 pages containing the full texts, tools, and exploits described and previewed in the book."
Author : John Chirillo
Publisher : John Wiley & Sons
Page : 1086 pages
File Size : 33,8 MB
Release : 2001-09-07
Category : Computers
ISBN :
CD-ROM contains: "10,000 pages containing the full texts, tools, and exploits described and previewed in the book."
Author : Simon Monk
Publisher : McGraw Hill Professional
Page : 305 pages
File Size : 25,54 MB
Release : 2013-03-22
Category : Technology & Engineering
ISBN : 0071802371
Bring your electronic inventions to life! "This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with full-color illustrations, photos, and diagrams, Hacking Electronics teaches by doing--each topic features fun, easy-to-follow projects. Discover how to hack sensors, accelerometers, remote controllers, ultrasonic rangefinders, motors, stereo equipment, microphones, and FM transmitters. The final chapter contains useful information on getting the most out of cheap or free bench and software tools. Safely solder, join wires, and connect switches Identify components and read schematic diagrams Understand the how and why of electronics theory Work with transistors, LEDs, and laser diode modules Power your devices with a/c supplies, batteries, or solar panels Get up and running on Arduino boards and pre-made modules Use sensors to detect everything from noxious gas to acceleration Build and modify audio amps, microphones, and transmitters Fix gadgets and scavenge useful parts from dead equipment
Author : Paul Graham
Publisher : "O'Reilly Media, Inc."
Page : 272 pages
File Size : 48,25 MB
Release : 2004-05-18
Category : Computers
ISBN : 0596006624
The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.
Author : Ben Buchanan
Publisher : Harvard University Press
Page : 433 pages
File Size : 33,74 MB
Release : 2020-02-25
Category : Political Science
ISBN : 0674245989
“A must-read...It reveals important truths.” —Vint Cerf, Internet pioneer “One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” —Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists. Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph. “A helpful reminder...of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.” —Jonathan Freedland, New York Review of Books “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.” —General David Petraeus, former Director of the CIA “Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’” —Richard Harknett, former Scholar-in-Residence at United States Cyber Command
Author : Quigley, Marian
Publisher : IGI Global
Page : 696 pages
File Size : 43,80 MB
Release : 2007-05-31
Category : Business & Economics
ISBN : 1591409888
Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial. The Encyclopedia of Information Ethics and Security is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool includes topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. This encyclopedia is a useful tool for students, academics, and professionals.
Author : Sean Ellis
Publisher : Crown Currency
Page : 322 pages
File Size : 24,86 MB
Release : 2017-04-25
Category : Business & Economics
ISBN : 0451497228
The definitive playbook by the pioneers of Growth Hacking, one of the hottest business methodologies in Silicon Valley and beyond. It seems hard to believe today, but there was a time when Airbnb was the best-kept secret of travel hackers and couch surfers, Pinterest was a niche web site frequented only by bakers and crafters, LinkedIn was an exclusive network for C-suite executives and top-level recruiters, Facebook was MySpace’s sorry step-brother, and Uber was a scrappy upstart that didn’t stand a chance against the Goliath that was New York City Yellow Cabs. So how did these companies grow from these humble beginnings into the powerhouses they are today? Contrary to popular belief, they didn’t explode to massive worldwide popularity simply by building a great product then crossing their fingers and hoping it would catch on. There was a studied, carefully implemented methodology behind these companies’ extraordinary rise. That methodology is called Growth Hacking, and it’s practitioners include not just today’s hottest start-ups, but also companies like IBM, Walmart, and Microsoft as well as the millions of entrepreneurs, marketers, managers and executives who make up the community of Growth Hackers. Think of the Growth Hacking methodology as doing for market-share growth what Lean Start-Up did for product development, and Scrum did for productivity. It involves cross-functional teams and rapid-tempo testing and iteration that focuses customers: attaining them, retaining them, engaging them, and motivating them to come back and buy more. An accessible and practical toolkit that teams and companies in all industries can use to increase their customer base and market share, this book walks readers through the process of creating and executing their own custom-made growth hacking strategy. It is a must read for any marketer, entrepreneur, innovator or manger looking to replace wasteful big bets and "spaghetti-on-the-wall" approaches with more consistent, replicable, cost-effective, and data-driven results.
Author : Nancy E. Marion
Publisher : Bloomsbury Publishing USA
Page : 370 pages
File Size : 48,13 MB
Release : 2020-10-06
Category : Computers
ISBN :
This important reference work is an extensive, up-to-date resource for students who want to investigate the world of cybercrime or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace. This comprehensive encyclopedia covers the most noteworthy attacks while also focusing on the myriad issues that surround cybercrime. It includes entries on such topics as the different types of cyberattacks, cybercrime techniques, specific cybercriminals and cybercrime groups, and cybercrime investigations. While objective in its approach, this book does not shy away from covering such relevant, controversial topics as Julian Assange and Russian interference in the 2016 U.S. presidential election. It also provides detailed information on all of the latest developments in this constantly evolving field.
Author : T. J. Klevinsky
Publisher : Addison-Wesley Professional
Page : 550 pages
File Size : 15,27 MB
Release : 2002
Category : Computers
ISBN : 9780201719567
CD-ROM contains: Freeware tools.
Author : Chris Scullion
Publisher : White Owl
Page : 277 pages
File Size : 33,4 MB
Release : 2021-12-08
Category : Games & Activities
ISBN : 1526746603
“An exhaustive, tremendous look back at one of the most beloved consoles of all time . . . an absolutely barnstorming recollection of a wonderful era.” —Finger Guns The third book in Chris Scullion’s series of video game encyclopedias, The Sega Mega Drive and Genesis Encyclopedia is dedicated to Sega’s legendary 16-bit video game console. The book contains detailed information on every single game released for the Sega Mega Drive and Genesis in the west, as well as similarly thorough bonus sections covering every game released for its add-ons, the Mega CD and 32X. With nearly a thousand screenshots, generous helpings of bonus trivia and charmingly bad jokes, The Sega Mega Drive and Genesis Encyclopedia is the definitive guide to a legendary gaming system. “The Sega Mega Drive and Genesis Encyclopedia is a must-buy for fans of the console and a perfect addition to any retro game fan’s library.” —Goomba Stomp Magazine
Author : Patrick Engebretson
Publisher : Elsevier
Page : 223 pages
File Size : 50,65 MB
Release : 2013-06-24
Category : Computers
ISBN : 0124116418
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test