Checkout

Hacking 33 results - showing 1 to 20.

The shellcoder's handbook

The shellcoder's handbook

" The Shellcoder's Handbook shows you how to: Non-Find out where security holes come from and how to close them so they never occur againPinpoint vulnerabilities in popular operating systems (including Windows(R), Linux(R), and SolarisTM) and ...

10.99 CHF

Coders at Work

Coders at Work

Reflections on the Craft of Programming Peter Seibel. and get working first that will help you to do the next step and build stuff up from there. In these cases, it was a matter of getting outside the box. That's a way of asserting that you've ...

21.99 CHF

Visual Guide to Lock Picking

Visual Guide to Lock ...

By reading this book, practicing, and applying the methods introduced, you can successfully master picking most modern locks. This book makes it easy and gives you the edge to quickly learn and start picking locks today.

27.49 CHF

Studyguide for Counter Hack Reloaded

Studyguide for Counter Hack ...

Cram101 Textbook Outlines gives all of the outlines, highlights, notes for your textbook with optional online practice tests. Only Cram101 Outlines are Textbook Specific. Cram101 is NOT the Textbook. Accompanys: 9780131481046 .

17.59 CHF

Gray Hat Hacking

Gray Hat Hacking

Malicious hackers are dedicated to bringing about mayhem and destruction--this book will teach you how to identify and stop them.

14.29 CHF

The Girl Who Played with Non-Fire

The Girl Who Played ...

Lisbeth Salander is a wanted woman. Two Millennium journalists about to expose the truth about sex trafficking in Sweden are murdered, and Salander's prints are on the weapon.

14.29 CHF

Reversing

Reversing

That's exactly what this book shows you--how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts.

4.39 CHF

Cyberpunk

Cyberpunk

Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find -- ...

25.29 CHF

Applied cryptography

Applied cryptography

. . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . .

4.39 CHF

The Girl Who Kicked the Hornet's Nest

The Girl Who Kicked ...

While recovering in the hospital, Lisbeth Salander enlists the aid of journalist Mikael Blomkvist to prove her innocent of three murders and identify the corrupt politicians who have allowed her to suffer, and, on her own, Lisbeth plots ...

17.59 CHF

Hacker's Delight

Hacker's Delight

"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades.

15.39 CHF

Google Hacking

Google Hacking

*Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing.

1.09 CHF

Silence On The Wire

Silence On The Wire

A Non-Field Guide To Passive Reconnaissance And Indirect Attacks Michal Zalewski. have no way of telling what is stored in a cookie. A server can choose to assign a unique identifier to a client using the Set-Cookie header and then read it back ...

5.49 CHF

Hacking Work

Hacking Work

In a fresh approach to work, the authors explain how professionals can: use their own tools and technologies instead of what the company mandates; cut through red tape; circumvent almost any company rule to work smarter, not harder; and ...

7.69 CHF

The Girl with the Dragon Tattoo

The Girl with the ...

Non-Forty years after the disappearance of Harriet Vanger from the secluded island owned and inhabited by the powerful Vanger family, her octogenarian uncle hires journalist Mikael Blomqvist and Lisbeth Salander, an unconventional young hacker, ...

27.49 CHF

Metasploit

Metasploit

"The Metasploit Non-Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.

20.89 CHF

We Are Anonymous

We Are Anonymous

WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.

30.79 CHF

Social Engineering

Social Engineering

... Published by Wiley Publishing, Inc.,Indianapolis, Indiana Published simultaneously inCanada ISBN: 9780470639535 ISBN: 9781118028018 (ebk) ISBN: 9781118029718(ebk) ISBN: 9781118029749 (ebk) Manufactured in the United States ...

10.99 CHF

The Cathedral & the Bazaar

The Cathedral & the ...

Argues that the development of Linux by thousands of programmers, in a coordinated effort without centralized management signals unprecedented power shifts in the computer industry.

12.09 CHF