Меню
Электронные Книги:
Журналы
Аудиокниги
- Фантастика,Фентази
- Любовный роман
- Остросюжетные
- Исусство и культура
- Техника
- Поэзия, стихи
- Детские книги
- Гуманитарные науки
- Здоровье, спорт
- Естественные науки
- Кулинария
- Научно-популярные
- История
- Фотография и видео
- Web-мастеру
- Компьютерная лит-ра
- Программирование
- Профессии
- Бизнес
- Военная тематика
- Аппаратура
- Психология
- Сад ,огород ,хозяйство
- Дом и семья
- Умелые руки
- Строительство, ремонт
- Живопись и рисование
- Дизайн и графика
- Учебные пособия
- Хобби и развлечения
- Эзотерика
- Разное
Журналы
- Развлекательные
- Кулинарные
- Спортивные
- О здоровье
- Рукоделие, сделай сам
- Строительство, дизайн
- Сад и дом
- Автомобили
- Технические
- Компьютеры
- Военные
- Бизнес
- Детям и родителям
- Гуманитарные
- Научно-популярные
- Фотография
Аудиокниги
Самое интересное
Hacking - The Next Generation (2009)
Категория: Компьютерная литература
Дата: 29 апреля 2010 |
Просмотров: 870 
Название: Hacking - The Next Generation
Год: 2009
Страниц: 279
Формат: PDF
Язык: Ангийский
Размер: 6,77 mb
This book is for anyone interested in learning the techniques that the more sophisticated attackers are using today. Other books on the topic have the habit of rehashing legacy attack and penetration methodologies that are no longer of any use to criminals. If you want to learn how the techniques criminals use today have evolved to contain crafty tools and procedures that can compromise a targeted individual or an enterprise, this book is for you.
Вы просматриваете информацию о Hacking - The Next Generation (2009). На сайте не хранится объектов авторского права, каких-либо файлов или ссылок на файлообменники.
Книги из категории Компьютерная литература:
![]() |
Chained Exploits: Advanced Hacking Attacks from Start to Finish The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of at ... Читать |
![]() |
Asterisk Hacking Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the ... Читать |
![]() |
Tradigital Maya: A CG Animator's Guide to Applying the Classical Principle ... Explore Disney’s 12 principles of animation, while learning how to animate in Maya. You can develop your own leading digital techniques rooted to traditional workflows. From squash and stretch to timing and appeal, you will enhance your creative tool ... Читать |
![]() |
Ancient Athenian Building Methods (Agora Picture Book 21) While this booklet is illustrated solely with materials from the Athenian Agora, it also provides a concise introduction to building styles and techniques that will be useful to anyone interested in ancient Greek architecture. From financing to tools ... Читать |
![]() |
HTML & CSS: The Good Parts HTML and CSS are the workhorses of web design, and using them together to build consistent, reliable web pages requires both skill and knowledge. The task is more difficult if you’re relying on outdated, confusing, and unnecessary HTML hacks and work ... Читать |
![]() |
ICEfaces 1.8: Next Generation Enterprise Web Development Create your first enterprise Web application with a desktop-like user interface.If you are an enterprise developer who wants to add the latest Web 2.0 features to a JSF project this book is for you. You need a basic knowledge of the Spring Framework ... Читать |
![]() |
The Non-Designer's Illustrator Book Many designers and photographers own the entire suite of Adobe creative products, but they manage to learn only one or two of the applications really well. This new addition to the popular Non-Designer’s series from best-selling authors Robin Willia ... Читать |
Кабинет
Ты не поверишь!








