?>
IT eBooks
Download, Read, Use

Hack eBooks

Kinect Hacks
Kinect Hacks

Create your own innovative applications in computer vision, game design, music, robotics, and other areas by taking full advantage of Kinect's extensive interactive, multi-media platform. With this book, you get a step-by-step walkthrough of the best techniques and tools to come out of the OpenKinect project, the largest and most active Kinect hacking community. Learn dozens of hacks for building interfaces that respond to body movements, gestures, and voice, using open source toolkits such as openFrameworks, the Processing IDE, and OpenKinect driver library. Whether you're an artist, designer, researcher, or hobbyist, this book will give you a running start with Kinect. ...
HTML5 Hacks
HTML5 Hacks

With 90 detailed hacks, expert web developers Jesse Cravens and Jeff Burtoft demonstrate intriguing uses of HTML5-related technologies. Each recipe provides a clear explanation, screenshots, and complete code examples for specifications that include Canvas, SVG, CSS3, multimedia, data storage, web workers, WebSockets, and geolocation. You'll also find hacks for HTML5 markup elements and attributes that will give you a solid foundation for creative recipes that follow. The last chapter walks you through everything you need to know to get your HTML5 app off the ground, from Node.js to deploying your server to the cloud. ...
Windows 8 Hacks
Windows 8 Hacks

Windows 8 is quite different than previous Microsoft operating systems, but it's still eminently hackable. With this book, you'll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that's just the beginning. You'll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack you'll also discover why it works. ...
Mac Kung Fu
Mac Kung Fu

After you've uncovered the basics in Lion, Mac Kung Fu is your next step. You'll learn how to master everyday tools such as the Dock, Spotlight, Mission Control, Launchpad, and Dashboard. You'll discover other amazingly useful tools and built-in add-ons that you never knew existed. You'll customize the OS X interface, refine your workflow, learn valuable security tricks, work better with photos, movies and documents, and test your Mac hardware. You'll wow friends with your insanely great Mac knowledge! Mac Kung Fu details things even Mac Geniuses don't know. And why should they? Many of the tips in this book exploit settings or experimental features never officially made public. Each tip in this unique book is deliberately short and readable, and you can dip in and out whenever you want. Most take less than a minute to complete, yet the results last for a lifetime of better computing. ...
Gray Hat Hacking, 3rd Edition
Gray Hat Hacking, 3rd Edition

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering. ...
Hackers
Hackers

Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak. Hackers traces the exploits of innovators from the research labs in the late 1950s to the rise of the home computer in the mid-1980s. It's a fascinating story for everyone interested in this seminal period in history. ...
Hacking Exposed Wireless, 2nd Edition
Hacking Exposed Wireless, 2nd Edition

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide. ...
Hacking Exposed Web Applications, 3rd Edition
Hacking Exposed Web Applications, 3rd Edition

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. ...
Hacking Vim 7.2
Hacking Vim 7.2

Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book. This book contains examples that cover everything from personalizing Vim according to the your work cycle to optimizations that will boost the your productivity. The main focus of this book is to make your life, as a Vim user, easier. ...
Hacking Exposed, 6th Edition
Hacking Exposed, 6th Edition

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material! ...
Hacking Exposed Computer Forensics, 2nd Edition
Hacking Exposed Computer Forensics, 2nd Edition

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026