• Ebook Google Hacks: 100 Industrial-Strength Tips & Tools

    Ebook Google Hacks: 100 Industrial-Strength Tips & Tools

    With the largest collection of web documents in the world, Google is a reflection of the Web. The hacks in this book are not just about Google, they are also about unleashing the vast potential of the Web today and in the years to come. Google Hacks is a great resource for search enthusiasts, and we hope you enjoy it as much as we did.

     384 p actvn 26/03/2024 17 0

  • Ebook Hack-X-Crypt: A straight forward guide towards ethical hacking and cyber security

    Ebook Hack-X-Crypt: A straight forward guide towards ethical hacking and cyber security

    This Book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like...

     105 p actvn 26/03/2024 15 0

  • Ebook Hacker’s challenge: Test your incident response skills using 20 scenarios

    Ebook Hacker’s challenge: Test your incident response skills using 20 scenarios

    Hacker’s Challenge brings you fact-based, computer-security war stories from top researchers, consultants, incident-response specialists, and forensic analysts working in the computer-security industry today. Rather than just retelling the story, however, the book goes further—it pulls you, the reader, inside the story. As each story unfolds, you are presented with information about the incident and are looked upon to solve the case. This...

     384 p actvn 26/03/2024 15 0

  • Ebook Hackers beware

    Ebook Hackers beware

    A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the...

     817 p actvn 26/03/2024 18 0

  • Ebook Hacking: Computer hacking, security testing, penetration testing and basic security - Gary Hall, Erin Watson

    Ebook Hacking: Computer hacking, security testing, penetration testing and basic security - Gary Hall, Erin Watson

    Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to...

     134 p actvn 26/03/2024 21 0

  • Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1 includes contents: Chapter 1: computer forensics in today’s world; chapter 2: systems, disks, and media; chapter 3: the computer investigation process; chapter 4: acquiring data, duplicating data, and recovering deleted files; chapter 5: Windows, Linux, and macintosh boot processes; chapter 6: Windows and Linux Forensics; chapter 7: steganography and...

     485 p actvn 26/03/2024 9 0

  • Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2 includes contents: Chapter 10: router forensics and network forensics; chapter 11: investigating wireless attacks; chapter 12: PDA, blackberry, and ipod forensics; chapter 13: forensic softwareand hardware; chapter 14: forensics investigation using encase; chapter 15: incident response; chapter 16: types of investigations; appendix a: becoming an expert...

     471 p actvn 26/03/2024 10 0

  • Ebook Forensic computer crime investigation

    Ebook Forensic computer crime investigation

    Ebook "Forensic computer crime investigation" includes contents: Chapter 1: computer crime and the electronic crime scene; chapter 2: the digital investigative unit: staffing, training, and issues; chapter 3: criminal investigation analysis and behavior: characteristics of computer criminals; chapter 4: investigative strategy and utilities; chapter 5: computer forensics & investigation: the training organization; chapter 6: internet crimes...

     338 p actvn 26/03/2024 8 0

  • Ebook Forensic computing: A practitioners guide (Second edition)

    Ebook Forensic computing: A practitioners guide (Second edition)

    Ebook Forensic computing: A practitioners guide (Second edition) includes contents: Chapter 1 forensic computing, chapter 2 understanding information, chapter 3 IT systems concepts, chapter 4 PC hardware and inside the box, chapter 5 disk geometry, chapter 6 the new technology file system, chapter 7 the treatment of pcs, chapter 8 the treatment of electronic organizers, chapter 9 looking ahead (just a little bit more).

     464 p actvn 26/03/2024 10 0

  • Ebook Cracking the coding interview (5th edition): Part 1

    Ebook Cracking the coding interview (5th edition): Part 1

    Ebook Cracking the coding interview (5th edition): Part 1 includes contents: The interview process, behind the scenes, special situations, before the interview, behavioral questions, technical questions, the offer and beyond.

     75 p actvn 26/03/2024 19 0

  • Ebook Cracking the coding interview (5th edition): Part 2

    Ebook Cracking the coding interview (5th edition): Part 2

    Ebook Cracking the coding interview (5th edition): Part 2 includes contents: Data structures, concepts and algorithms, knowledge based, additional review problems, threads and lock, recursion and dynamic programming, brain teaser, bit manipulation,... and other contents.

     435 p actvn 26/03/2024 16 0

  • Ebook Computer & intrusion forensics: Part 1

    Ebook Computer & intrusion forensics: Part 1

    In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.

     196 p actvn 26/03/2024 8 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn