All counter of AlamanShop


David Brading
Haciendas and Ranchos in the Mexican Bajio: Leon 1700-1860 (Cambridge Latin American Studies)

2009 y.
Publisher: —
Description: During the eighteenth century the Bajio emerged from its frontier condition to become the pace-maker of the Mexican economy. Silver mining boomed and population increased rapidly. It is the aim of this book to examine the impact of these dramatic changes on the structure of agricultural production and the pattern of rural society. [detailed...]

ISBN: 0521102367
Book size: —; Page extent: 280.

 

PUT TO
THE BASKET

Hack Ai Buster 1

2005 y.
Publisher: —
Description: Log On to AI Buster, This Year`s Most Exciting Novel! In the epic prequel to .hack, the avatar Albireo is a solo adventurer in The World, the most advanced online fantasy game ever created. When he comes across Lycoris, a strange little girl in a dungeon, Albireo wonders if she`s simply nothing more than a bug in the system. As the two journey further into The World, Albireo watches Lycoris turn all of the rules of The World upside down. Slowly, he comes to realize that she may hold a very deadly secret--a secret that could unhinge everything in cyberspace…and beyond! The untold origin of the super popular anime and manga franchise begins right here! [detailed...]

ISBN: 1595328696
Book size: —; Page extent: 236.

 

PUT TO
THE BASKET
John Chirillo
Hack Attacks Denied: A Complete Guide to Network Lockdown for UNIX, Windows, and Linux, Second Edition

— y.
Publisher: —
Description: John Chirillo is back and ready to help you outsmart the next generation of intruders! Since the publication of the First Edition, new security breaches to networks have inevitably occurred. In order to keep hack-prevention information as current as possible for security engineers and designers, John Chirillo is back with a new edition on how to fortify your networks and home computers. He`s updated his bestselling book and is ready to arm you with the necessary security steps from the system to the daemon, concluding with that crucial ingredient-an effective security policy. Packed with nearly 400 pages of fresh material, including new fortification techniques, advisory solutions, and firewall labs, Hack Attacks Denied, Second Edition offers vitalinsight that will teach you how to be aware of potential security dangers. This all-in-one reference covers Windows, UNIX, and Linux, and teaches you how to keep the hacks out of your network by using the same Tiger Box tools… [detailed...]

ISBN: 0471232831
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
John Chirillo
Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition

— y.
Publisher: —
Description: The much-anticipated second edition of the bestselling book that details network security through the hacker`s eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you`ll discover: * The hacker`s perspective on security holes in UNIX, Linux, and Windows networks * Over 170 new vulnerabilities and exploits * Advanced discovery techniques * A crash course in C for compiling hacker tools and vulnerability scanners * The top seventy-five hack attacks for UNIX and Windows * Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more *… [detailed...]

ISBN: 0471232823
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
T. J. Klevinsky, Scott Laliberte, Ajay Gupta
Hack I.T.: Security Through Penetration Testing

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0201719568
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Steve Casco, Rob Rusher, Greg Meyer, Sarge, David Vaccaro, David An
Hack Proofing ColdFusion

— y.
Publisher: —
Description: Hack Proofing ColdFusion 5.0 is the seventh volume in the popular Hack Proofing series from Syngress Publishing and is the only book specifically written for developers devoted to protecting their ColdFusion Web applications. This book and CDROM set provide developers with step-by-step instructions for developing secure Web applications. [detailed...]

ISBN: 1928994776
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
James Stanger, Patrick T. Lane
Hack Proofing Linux : A Guide to Open Source Security

— y.
Publisher: —
Description: The Linux operating system continues to gain market share, based largely on its reputation as the most secure operating system available. The challenge faced by system administrators is that Linux is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. Hack Proofing Linux provides the system administrator with coverage of the most popular Linux operating systems and Open Source security tools, along with the techniques necessary to properly configure and maintain Linux systems and to counter malicious attacks. [detailed...]

ISBN: 1928994342
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Wyman Miles, Ed Mitchell, F. William Lynch, Randy Cook, Ido Dubrawsky
Hack Proofing Sun Solaris 8

— y.
Publisher: —
Description: Hack Proofing Sun Solaris 8 is written for system administrators and security professionals concerned with protecting their Sun Solaris operating system. Covering everything from the motivation of a hacker to the tools and techniques that hackers use, security professionals proficient in the Solaris OS will provide the information needed to fortify the operating system and network. [detailed...]

ISBN: 192899444X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Chad Todd, Norris L., Jr Johnson
Hack Proofing Windows 2000 Server

— y.
Publisher: —
Description: Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes andexplains complicated architectures through experience and research. The authors include directions on how to use security services, including Kerberos and the Encrypting File System (EFS). Most of the coverage examines behind-the-interface operations, relying on flow diagrams and uncluttered conceptual drawings to illustrate processes like smart-card authentication and the Public Key Infrastructure (PKI). Question-and-answer sections at the end of each chapter are well-chosen, one example asks about using 128-bit encryption across an international network. [detailed...]

ISBN: 1931836493
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Teri Bidwell
Hack Proofing Your Identity

— y.
Publisher: —
Description: — [detailed...]

ISBN: 1931836515
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh
Hack Proofing Your Network (Second Edition)

— y.
Publisher: —
Description: Called ?a bold, unsparing tour of information that never swerves from the practical,? this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one. 1. Know the Laws of Security Review the authors? guidelines for discovering security problems when reviewing or designing a system. 2. Learn the SevenCategories of Attack See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you! 3. Prevent Diffing See how the comparison of a program, library, or file before and after some action can affect your network data. 4. Learn about Standard Cryptographic Algorithms See how secure your encrypted files and passwords really are. 5…. [detailed...]

ISBN: 1928994709
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Christian Barnes, Tony Bautts, Donald Lloyd, Eric Ouellet, Jeffrey Posluns, David M. Zendzian, Neal O`Farrell
Hack Proofing Your Wireless Network

— y.
Publisher: —
Description: Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at home? Are you planning on implementing a wireless solution in your office? Then you need Hack Proofing Your Wireless Network. [detailed...]

ISBN: 1928994598
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Tatsuya Hamazaki
Hack ai Buster 2 (.Hack AI Buster)

2006 y.
Publisher: —
Description: `An instantly discernable and absorbing cyber-reality accessible to anyone with a sense of wonder.`-Dave Halverson, Play Magazine Log on to the Continuing Adventures of .hack//AI buster! Your favorite .hack characters are gathered in this mind-blowing collection of stories that delves into the character`s real-world personalities and their in-game avatars--and examines the far reaches of The World…and beyond! Take a journey inside the pages of this hallowed collection:Get to know Haruka Mizuhara, the real woman behind Hokuto-Discover the reason for Albireo`s departure from The World-Cross paths with Kamui, the leader of the Cobalt Knights, who protects The World from bugs-Meet Rena, a little girl with a big personality -Find out how Hotaru and Sanjuro first meet The untold stories from the super popular manga, anime and gaming franchise continue right here! [detailed...]

ISBN: 1598164074
Book size: —; Page extent: 192.

 

PUT TO
THE BASKET
Nitesh Dhanjani
HackNotes(tm) Linux and Unix Security Portable Reference

2003 y.
Publisher: McGraw-Hill Osborne Media
Description: Safeguard your systems from all types of hackers, hijackers, and predators with help from this insightful resource. Get thorough, just-the-facts coverage of Linux, UNIX and Solaris, and learn about advanced hacking techniques including buffer overflows, password theory, port re-direction, and more. [detailed...]

ISBN: 0072227869
Book size: —; Page extent: 224.

 

PUT TO
THE BASKET
Michael Horton, Clinton Mugge
HackNotes(tm) Network Security Portable Reference

— y.
Publisher: —
Description: Here’s the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architecture solutions. Plus, learn to use a full complement of effective, up-to-date security tools. [detailed...]

ISBN: 0072227834
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Mike Shema
HackNotes(tm) Web Security Pocket Reference

— y.
Publisher: —
Description: Let consultant, trainer, and author Mike Shema show you how to guard against standard and uncommon network penetration methodologies and eliminate susceptibility to e-commerce hacking. Plus, learn to bolster Web application security and secure vulnerablehacking function areas. [detailed...]

ISBN: 0072227842
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Michael O`Dea
HackNotes(tm) Windows Security Portable Reference

— y.
Publisher: —
Description: Secure Windows 2000 Server, Windows XP systems, and Windows Server 2003. The book explains how to follow reference matrixes of useful services for Windows and UNIX. Plus, you’ll learn best practices for trace routing and source address location. [detailed...]

ISBN: 0072227850
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Cricket Mapes
Hackamore Springs

2009 y.
Publisher: —
Description: - [detailed...]

ISBN: 1608367800
Book size: —; Page extent: 300.

 

PUT TO
THE BASKET
David Chanoff, Ejovi Nuwere
Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

— y.
Publisher: —
Description: Like other kids in the Bedford-Stuyvesant neighborhood of Brooklyn, Ejovi Nuwere grew up among thugs and drug dealers. When he was eleven, he helped form a gang, at twelve, he attempted suicide. In his large, extended family, one uncle was a career criminal, one a graduate student with his own computer. By the time Ejovi was fourteen, he was spending as much time on the computer as his uncle was. Within a year he was well on his way to a hacking career that would lead him to one of the most audacious and potentially dangerous computer break-ins of all time, secret until now. Before he finished high school he had created a hidden life in the hacker underground and an increasingly prominent career as a computer security consultant. At the age of twenty-two, he was a top security specialist for one of the world`s largest financial houses. Hacker Cracker is at once the most candid revelation to date of the dark secrets of cyberspace and the simple, unaffected story… [detailed...]

ISBN: 0060935812
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Douglas Thomas
Hacker Culture

— y.
Publisher: —
Description: Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Thomas studies novels and films (Neuromancer, WarGames, Hackers, and The Matrix) and reveals contemporary views of hackers as technological wizards, high-tech pranksters, and virtual criminals. Thomas then examines the court cases of Kevin Mitnick and Chris Lamprecht to determine how hackers are defined as criminals. Thomas finds that popular hacker stereotypes express the public`s anxieties about the information age far more than they do the reality of hacking. Douglas Thomas is associate professor in the Annenberg School for Communication at the University of Southern California. [detailed...]

ISBN: 0816633460
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Kris Kaspersky
Hacker Debugging Uncovered (Uncovered Series)

— y.
Publisher: —
Description: Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger, with minimum binding to a specific environment are disclosed in this debugger guide. How debuggers operate and how to overcome obstacles and repair debuggers is demonstrated. Programmers will learn how to look at what is inside a computer system, how to reconstruct the operating algorithm of a program distributed without source code, how to modify the program, and how to debug drivers. The use of debugging applications and drivers in Windows and Unix operating systems on Intel Pentium/DEC Alpha-based processors is also detailed. [detailed...]

ISBN: 1931769400
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Kris Kaspersky, Natalia Tarkova, Julie Laing
Hacker Disassembling Uncovered

— y.
Publisher: —
Description: — [detailed...]

ISBN: 1931769222
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Kris Jamsa
Hacker Proof

— y.
Publisher: —
Description: Hacker Proof: The Ultimate Guide to Network Security provides a detailed examination of the security concepts network administrators, programmers, and Webmasters must know. The first edition was the original Hacker book and now the updated second editionis even better! Nonprogrammers will readily understand security threats and the steps they must perform to prevent them. Programmers will be thrilled with the detailed programming examples that demonstrate how hackers penetrate the most secure computer systems, The book`s companion CD-ROM includes software users can run to test their system`s security and look at hacker scenarios. [detailed...]

ISBN: 0766862712
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Filippo Caburlotto
Hacker per caso

2003 y.
Publisher: Bonacci Editore
Description: Mosaico italiano e una collana di letture di italiano per stranieri graduate in quattro livelli di difficolta linguistica. I racconti, appositamente scritti per un pubblico straniero, rivalutano il piacere delta lettura proponendo una lingua `facilitata` e al contempo `autentica`, dove i dialoghi riproducono il parlato in diverse situazioni comunicative. Ogni racconto e corredato da note esplicative e attivita con chiave di soluzione. Era da tempo che si divertiva con il computer, finche un giorno… L`avventura di Morpheus: la storia di una scelta. Finalmente era arrivata la sua grande occasione: poteva dimostrare a tutti quanto era bravo… ma gli interessava di piu lavorare per una famosa societa о diventare un famoso hacker? Una storia ricca di colpi di scena, in bilico fino all`ultima pagina. Формат: 15 cм x 21 cм. [detailed...]

ISBN: 88-7573-382-1
Book size: —; Page extent: 32.

 

PUT TO
THE BASKET
Mike Schiffman, Bill Pennington, David Pollino, Adam J. O`Donnell
Hacker`s Challenge 2: Test Your Network Security &, Forensic Skills

— y.
Publisher: —
Description: Do you have what it takes to keep the bad guys out of your network? Find out with the latest edition of this best-selling book featuring 20+ all new hacking challenges for you to solve. Plus, you`ll get in-depth solutions for each, all written by experienced security consultants. [detailed...]

ISBN: 0072226307
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Henry S. Warren Jr.
Hacker`s Delight

2002 y.
Publisher: Addison-Wesley Professional
Description: A collection useful programming advice the author has collected over the years, small algorithms that make the programmer`s task easier.@BULLET = At long last, proven short-cuts to mastering difficult aspects of computer programming.@BULLET = Learn to program at a more advanced level than is generally taught in schools and training courses, and much more advanced than can be learned through individual study/experience.@BULLET = An instant cult classic for programmers!@SUMMARY = Computer programmers are often referred to as hackers -- solitary problem solvers engrossed in a world of code as they seek elegant solutions to building better software. While many view these unique individuals as `madmen,` the truth is that much of the computer programmer`s job involves a healthy mix of arithmetic and logic. In Hacker`s Delight, veteran programmer Hank Warren shares the collected wisdom -- namely tips and tricks -- from his considerable experience in the world of application development. The… [detailed...]

ISBN: 0201914654
Book size: —; Page extent: 320.

 

PUT TO
THE BASKET
Tamar E. Granor, Ted Roche, Doug Hennig, Della Martin, Steven M. Black
Hacker`s Guide to Visual FoxPro 7.0

— y.
Publisher: —
Description: An irreverent look at how Visual FoxPro really works, this guide gives developers insight into every command, function, event, and method of version 7.0, including Service Pack One. Recognized within the FoxPro developer community as the indispensable resource for serious FoxPro development, this updated edition covers Visual FoxPro`s Power Tools and the various components of the language, including Xbase traditions and assumptions. Also included are hardware tips and optimization guidelines. Subjects such as Active technologies as they relate to VFP, the Class Browser and Component Gallery, VFP`s Builder and Wizard technologies, and VFP`s version of IntelliSense are covered in detail. This replaces 0965509362. [detailed...]

ISBN: 1930919220
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Dr K
Hacker`s Handbook 3.0

2008 y.
Publisher: —
Description: This expanded, revised and updated edition of The Hackers Handbook 3.0 looks at the whole phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary hackers and their exploits, to the basic tools that hackers use todayand how to guard against them, or apply them yourself to start learning the art of information retrieval. All the different areas of hacking are clearly discussed, along with their implications, what is at stake, ways to protect against potential damage, and how to try them out for yourself. There is also a full range of hints and tips for getting the most out of the basic Internet tools we all use, such as email, the World Wide Web, and more. [detailed...]

ISBN: 1847321100
Book size: —; Page extent: 256.

 

PUT TO
THE BASKET
Eric Cole
Hackers Beware: The Ultimate Guide to Network Security

— y.
Publisher: —
Description: Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested `in how they do that` - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book willcover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it. [detailed...]

ISBN: 0735710090
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Paul A. Taylor, Paul Taylor
Hackers: Crime in the Digital Sublime

— y.
Publisher: —
Description: Freedom fighers or anarchists? In Hackers, Paul A. Taylor looks at these characters and the perennial battle between computer hackers and the security industry. He talks to computer scientists, security experts, and the hackers themselves about the practicalities, objectives, and the wider implications of what they do. In astonishingly frank interviews, Taylor provides a revealing and richly sourced account of the debates that surround this controversial practice. He reveals that extreme conciliation andantagonism from the computer industry toward hackers creates potentially dangerous outcomes and argues that a new middle way must be found if we are to make the most of society`s high-tech meddlers. [detailed...]

ISBN: 0415180724
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
David J. Gunkel
Hacking Cyberspace

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0813336694
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz