Hacking
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Hacking December 15,2014 )
epub |eng | 2005-03-01 | Author:Ken Bluttman & Bluttman Ken [Bluttman, Ken & Ken, Bluttman]

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
( Category: Hacking November 28,2014 )
epub, mobi, azw3 |eng | 2014-11-18 | Author:Brian Krebs [Krebs, Brian]

Severa Cosma ran his stock spam business in tandem with that of another cybercrook, a hacker who uses the nickname “Severa.” This spammer was named as a defendant in an ...
( Category: Hacking November 26,2014 )
epub, azw3 |eng | | Author:Gabriella Coleman

Upon reading the article, many of the hackers, already annoyed at Brown, became infuriated, lashing out at him on #anonleaks, the channel dedicated to discussing the HBGary leaks. <tflow>: it’s ...
( Category: Anarchism November 24,2014 )
epub |eng | 2011-08-31 | Author:Stryker, Cole [Stryker, Cole]

Despite my pessimistic tone, I predict that “Anonymous” will continue to grow. As more and more attention is given to these “secret websites,” more and more people are clamoring to ...
( Category: Hacking November 11,2014 )
epub, mobi |eng | 2014-10-07 | Author:Walter Isaacson [Isaacson, Walter]

Alan Kay (1940– ) at Xerox PARC in 1974. Kay’s 1972 sketch for a Dynabook. Lee Felsenstein (1945– ). The first issue, October 1972. By keeping children (of all ages) ...
( Category: Hacking October 27,2014 )
epub |eng | 2010-05-30 | Author:Steven Levy [Levy, Steven]

Ken and Jay would be talking about the intricacies of some aspect of programming language—like trying to figure out, when somebody says “List by customer,” what that really means. Does ...
( Category: Hacking October 13,2014 )
mobi |eng | 2005-01-02 | Author:Kevin Mitnick [Mitnick, Kevin]

They discovered a live network jack, presumably for the convenience of company personnel who wanted to be able to access the corporate network during meetings. Plugging in an Ethernet cable ...
( Category: Hacking October 13,2014 )
mobi, epub |eng | 2014-10-06 | Author:Walter Isaacson

THE COMMUNITY ORGANIZERS Among the tribes of the Bay Area in the years leading up to the birth of the personal computer was a cohort of community organizers and peace ...
( Category: Hacking October 9,2014 )
epub, mobi |eng | 2014-10-06 | Author:Walter Isaacson [Isaacson, Walter]

THE COMMUNITY ORGANIZERS Among the tribes of the Bay Area in the years leading up to the birth of the personal computer was a cohort of community organizers and peace ...
( Category: Hacking October 8,2014 )
epub |eng | 2005-10-03 | Author:Charles M. Kozierok [Charles M. Kozierok]

( Category: Email Administration September 17,2014 )
epub, azw3, pdf |eng | 2013-04-24 | Author:John Nussey

// Pin 13 has an LED connected on most Arduino boards. // give it a name: int led = 13; // the setup routine runs once when you press reset: ...
( Category: Software Development September 6,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema

Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category: Hacking August 28,2014 )
epub, mobi |eng | 2010-11-24 | Author:Christopher Hadnagy [Hadnagy, Christopher]

Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category: Hacking August 27,2014 )
epub |eng | | Author:Bruce Sterling

* * * For the neophyte, one of the most puzzling aspects of the crackdown on hackers is why the United States Secret Service has anything at all to do ...
( Category: Hacking May 30,2014 )

Categories
Popular ebooks
Deep Learning with Python by François Chollet(12578)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6419)
Kotlin in Action by Dmitry Jemerov(5066)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3808)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3331)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3088)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Art Of Deception by Kevin Mitnick(2606)
Drugs Unlimited by Mike Power(2467)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2314)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2309)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2263)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2188)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2078)
Full-Stack React Projects by Shama Hoque(1991)