?>
IT eBooks
Download, Read, Use

Hack eBooks

Hacking Secret Ciphers with Python
Hacking Secret Ciphers with Python

There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about encryption, hacking, or cryptography. The ciphers in this book (except for the RSA cipher in the last chapter) are all centuries old, and modern computers now have the computational power to hack their encrypted messages. No modern organization or individuals use these ciphers anymore. As such, there's no reasonable context in which you could get into legal trouble for the information in this book. ...
Mac Hacks
Mac Hacks

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn't expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them to. There are more than 50 hacks in this book that show you how to fine-tune the interface, work with multimedia, set up your network, boost security, and perform a few tricks with Unix. ...
Hacking For Dummies, 4th Edition
Hacking For Dummies, 4th Edition

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. ...
50 Android Hacks
50 Android Hacks

Hacks. Clever programming techniques to solve thorny little problems. Ten lines of code that save you two days of work. The little gems you learn from the old guy in the next cube or from the geniuses on Stack Overflow. That's just what you'll find in this compact and useful book. The name 50 Android Hacks says it all. Ranging from the mundane to the spectacular, each self-contained, fully illustrated hack is just a couple of pages long and includes annotated source code. These practical techniques are organized into twelve collections covering layout, animations, patterns, and more. ...
Hacking Exposed Mobile
Hacking Exposed Mobile

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained. Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. ...
Hacking and Securing iOS Applications
Hacking and Securing iOS Applications

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must - chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. ...
Machine Learning for Hackers
Machine Learning for Hackers

If you're an experienced programmer interested in crunching data, this book will get you started with machine learning - a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation. Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you'll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research. ...
Hacking the Kinect
Hacking the Kinect

Hacking the Kinect is the technogeek's guide to developing software and creating projects involving the groundbreaking volumetric sensor known as the Microsoft Kinect. Microsoft's release of the Kinect in the fall of 2010 startled the technology world by providing a low-cost sensor that can detect and track body movement in three-dimensional space. The Kinect set new records for the fastest-selling gadget of all time. It has been adopted worldwide by hobbyists, robotics enthusiasts, artists, and even some entrepreneurs hoping to build business around the technology. ...
Oracle 11g Anti-hacker's Cookbook
Oracle 11g Anti-hacker's Cookbook

Learn to protect your sensitive data by using industry certified techniques. Implement and use ultimate techniques in Oracle Security and new security features introduced in Oracle 11g R2. Implement strong network communication security using different encryption solutions provided by Oracle Advanced Security. ...
Mac Kung Fu, 2nd edition
Mac Kung Fu, 2nd edition

Mac Kung Fu: Second Edition will blow your mind with secret hacks never before made public and little-known tricks that will change the way you work forever. From big tasks through everyday jobs, this book will improve your productivity and refine your workflow. You'll customize and manage the OS X interface, boost the power of built-in apps, efficiently handle the filesystem, implement important security tricks, and much more. ...
Kinect Hacks
Kinect Hacks

Create your own innovative applications in computer vision, game design, music, robotics, and other areas by taking full advantage of Kinect's extensive interactive, multi-media platform. With this book, you get a step-by-step walkthrough of the best techniques and tools to come out of the OpenKinect project, the largest and most active Kinect hacking community. Learn dozens of hacks for building interfaces that respond to body movements, gestures, and voice, using open source toolkits such as openFrameworks, the Processing IDE, and OpenKinect driver library. Whether you're an artist, designer, researcher, or hobbyist, this book will give you a running start with Kinect. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026