IT eBooks
Download, Read, Use
Hacking VoIP
Hacking VoIP

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. ...
Computer Assisted Exercises and Training
Computer Assisted Exercises and Training

Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large civilian organizations that are looking to teach and test their strategies and procedures without the added cost of manpower. Computer Assisted Exercises and Training: A Reference Guide is indispensable reading for research engineers, computer scientists, software engineers working with modeling and simulation, homeland security specialists, staff in simulation training centers, military strategists and commanders, and many others. It also serves as a valuable textbook for modeling and simulation courses at the upper-undergraduate and graduate levels. ...
Smart Card Handbook, 4th Edition
Smart Card Handbook, 4th Edition

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health care cards, smart cards for public transport, and Java Card 3.0. New sub-chapters cover near field communication (NFC), single wire protocol (SWP), and multi megabyte smart cards (microcontroller with NAND-Flash). There are also extensive revisions to chapters on smart card production, the security of smart cards (including coverage of new attacks and protection methods), and contactless card data transmission (ISO/IEC 10536, ISO/IEC 14443, ISO/IEC 15693). ...
Models and Analysis for Distributed Systems
Models and Analysis for Distributed Systems

Nowadays, distributed systems are increasingly present, for public software applications as well as critical systems. software applications as well as critical systems. This title and Distributed Systems: Design and Algorithms - from the same editors - introduce the underlying concepts, the associated design techniques and the related security issues. The objective of this book is to describe the state of the art of the formal methods for the analysis of distributed systems. Numerous issues remain open and are the topics of major research projects. One current research trend consists of profoundly mixing the design, modeling, verification and implementation stages. This prototyping-based approach is centered around the concept of model refinement. ...
Windows XP All-in-One Desk Reference For Dummies, 2nd Edition
Windows XP All-in-One Desk Reference For Dummies, 2nd Edition

Windows is the number one operating system in the world. There's a lot to Windows XP, with office productivity applications, multimedia features, the Internet, and security upgrades. Now and then, you probably wish you could call Tech Support. With thumbtabs that make it easy to find what you're looking for and the famous For Dummies cheat sheet in the front, this book is designed to make life with Windows XP a lot easier, happier, safer, and a whole lot more fun. ...
Computer Viruses For Dummies
Computer Viruses For Dummies

Computer viruses - just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Remember, if you don't protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses. ...
WordPress 2.7 Cookbook
WordPress 2.7 Cookbook

About 120,000 blogs are created every day. Most of them quickly die, but a few stay, grow up, and then become well known and respected places on the Web. If you are seriously interested in being in the top league, you will need to learn all the tricks of the trade. WordPress 2.7 Cookbook focuses on providing solutions to common WordPress problems, to make sure that your blog will be one of the ones that stay. The author's experience with WordPress enables him to share insights on using WordPress effectively, in a clear and friendly way, giving practical hands-on solutions to WordPress problems, questions, and common tasks - from themes to widgets and from SEO to security. ...
Oracle APEX Best Practices
Oracle APEX Best Practices

Have you ever wanted to create real-world database applications? In this book you're not only getting APEX best practices, but will also take into account the total environment of an APEX application and benefit from it. Oracle APEX Best Practices will guide you through the development of real-world applications. It will give you a broader view of APEX. The various aspects include setting up APEX environment, testing and debugging, security, and getting the best out of SQL and PL/SQL. ...
Windows XP Unleashed
Windows XP Unleashed

Windows XP Unleashed guides the advanced reader through nearly every Windows XP topic imaginable giving ideas and solutions practical to typical problems encountered by professionals. How to build network bridges between Dissimilar operating systems; Working with compatibility modes to enable older O/S to interact with XP; Performance tuning; Optimizing memory; Detailed registry info; Maximizing XP for the internet, intranet, and security. ...
Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Microsoft Windows 7 Unleashed gives IT professionals, serious power users, and true geeks the powerhouse Windows 7 tweaks, hacks, techniques, and insights they need: knowledge that simply can't be found anywhere else. Top Windows expert Paul McFedries dives deep into Windows 7, returning with the most powerful ways to handle everything from networking to administration, security to scripting. McFedries begins with advanced customization, covering everything from startup / shutdown to the file system. He introduces new ways to tune Windows 7 performance, police Windows via Group Policies, tweak the Registry, make the most of Windows 7s management tools, and control Windows 7 from the command line. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025