All counter of AlamanShop


Chieh Cheng, Auri Rahimzadeh
Hacking Digital Cameras (ExtremeTech)

2005 y.
Publisher: —
Description: Why waste a thousand words? Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole lens. Beef up flash memory. And that`s just where the tale begins. The ending is up to you. Hack any digital camera Illustrated step-by-step directions for more than 20 hacks, including: Building triggers Accessing raw sensor data Making accessory lens adapters Eliminating the infrared blocking filter Extending lenses Making reverse macro adapters Building a monopod Creating bicycle and car mounts Hacking microdrives from other devices [detailed...]

ISBN: 0764596519
Book size: —; Page extent: 519.

 

PUT TO
THE BASKET
David Endler, Mark Collier
Hacking Exposed VoIP: Voice Over IP Security Secrets &, Solutions (Hacking Exposed)

2006 y.
Publisher: McGraw-Hill Osborne Media
Description: Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way `This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies.` --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you`ll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and… [detailed...]

ISBN: 0072263644
Book size: —; Page extent: 540.

 

PUT TO
THE BASKET
Stuart McClure, Joel Scambray, George Kurtz
Hacking Exposed, Sixth Edition: Network Security SecretsAnd Solutions

2009 y.
Publisher: —
Description: The tenth anniversary edition of the world`s bestselling computer security book!The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today`s most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.Hacking Exposed 6 applies the authors` internationally renowned computer security methodologies, technical rigor, and `from-the-trenches` experience to make computer technology usage and deployments safer and more secure for businesses and consumers.`A cross between a spy novel and a tech manual.` --Mark A. Kellner, Washington TimesAndquot,The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to… [detailed...]

ISBN: 0071613749
Book size: —; Page extent: 720.

 

PUT TO
THE BASKET
Kevin Beaver
Hacking For Dummies (For Dummies (Computer/Tech))

2006 y.
Publisher: —
Description: Develop a plan to keep your information safe Find out how to test your systems, plug the holes, and foil attackers You`ll find out how external hacker and rogue insider hacks happen, how to discover where your systems and network are weak, what you can do to strengthen your defenses, and how to prepare reports and recommendations to management. Discover how to Identify the different types of attacks Create a plan for testing Recognize vulnerabilities in your network Prevent attacks by rogue insiders Test applications, files, and databases Plug security holes [detailed...]

ISBN: 047005235X
Book size: —; Page extent: 388.

 

PUT TO
THE BASKET
Kevin Beaver
Hacking For Dummies

2010 y.
Publisher: —
Description: A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It`s bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you`ll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Explores the malicious hackers`s mindset so that you can counteract or avoid attacks… [detailed...]

ISBN: 0470550937
Book size: —; Page extent: 408.

 

PUT TO
THE BASKET
Kathie Kingsley-Hughes
Hacking GPS (ExtremeTech)

2005 y.
Publisher: —
Description: * This is the `user manual` that didn`t come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels! * Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS * Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connection with a GPS * Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken * Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector [detailed...]

ISBN: 0764584243
Book size: —; Page extent: 358.

 

PUT TO
THE BASKET
Robin Wasserman
Hacking Harvard

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 1416936335
Book size: —; Page extent: 336.

 

PUT TO
THE BASKET
Scott Granneman
Hacking Knoppix (ExtremeTech)

2006 y.
Publisher: —
Description: Knoppix is an innovative Linux distribution that does not require installation, making it ideal to use for a rescue system, demonstration purposes, or many other applications Shows hack-hungry fans how to fully customize Knoppix and Knoppix-based distributions Readers will learn to create two different Knoppix-based live CDs, one for children and one for Windows recovery Teaches readers to use Knoppix to work from a strange computer, rescue a Windows computer that won`t boot, repair and recover data from other machines, and more Includes Knoppix Light 4.0 on a ready-to-use, bootable live CD [detailed...]

ISBN: 0764597841
Book size: —; Page extent: 336.

 

PUT TO
THE BASKET
Scott Knaster
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations

2005 y.
Publisher: —
Description: This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster: Shows you how to speed it up, lock it down, or pull back the curtains. Dives into default system settings, unlocks hidden gems, and includes original Mac OS X programs with full source listings and explanations. Shows heavyweight hackers the tricks and modes of OS X booting, tweaks for login screens, and how to customize or even kill the Dock. Offers the inside scoop on Dashboard and Spotlight, including two sample widgets and one Spotlight importer, all with fully annotated source listings. Demonstrates how to install and use Unix and X11 applications, take advantage of command line tools, and create system services and active Dock badges. Order your copy today. [detailed...]

ISBN: 076458345X
Book size: —; Page extent: 378.

 

PUT TO
THE BASKET
John Pospisil
Hacking MySpace: Mods and Customizations to make MySpace Your Space (ExtremeTech)

2006 y.
Publisher: —
Description: Get noticed. Get discovered. It`s YourSpace There are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and content of your profile. You get the inside scoop on hot design and photography. You maximize the effects of HTML and CSS. And, if you happen to be a musician, you check out Chapter 30 to see how MySpace can launch your career. It`s all in here. What are you waiting for? Make it all about you. Complete code and instructions for these and more MySpace hacks: Embedding graphics Creating animated images Developing your own background Building custom cursors Changing profile text styles Getting kinky with links Adding a comments box Altering your contact table Redesigning the navigation bar Making DIV overlays A companion Web site provides even… [detailed...]

ISBN: 0470045841
Book size: —; Page extent: 408.

 

PUT TO
THE BASKET
Jarod Wilson, Ed Tittel, Matthew Wright, Justin Korelc
Hacking MythTV (ExtremeTech)

2006 y.
Publisher: —
Description: Want control? Build your own MythTV PC. You don`t do stuff like this to cut corners. You do it because you want what you want?and because it`s fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how, assorted software components and plug-ins, an adventurous nature, and this book to tell you how it all goes together. VoilA ?the entertainment hub of your dreams. Learn to do all this and much more: Choose HD capture cards and sound drivers. Install and configure MythTV. Build your program guides. Use xine to add DVD menu support. Pass raw digital streams to an external decoder. Do cool things with your remote control. Hack your own themes. Export MythTV .nuv recordings to other formats. A companion Web site provides even more of the… [detailed...]

ISBN: 0470037873
Book size: —; Page extent: 432.

 

PUT TO
THE BASKET
Kim Schulz
Hacking Vim: A Cookbook to Get the Most out of the Latest Vim Editor: From Personalizing Vim to Productivity Optimizations: Recipes to Make Life Easier for Experienced Vim Users

2007 y.
Publisher: Packt Publishing
Description: Each chapter of this book deals with a different aspect, and provides recipes for easy-to-use hacks to customize and simplify your Vim experience. After an introduction covering the derivation of Vim and its relatives from the vi editor, the author explains basic changes that you can make to the appearance of the Vim editor. Further chapters cover improved navigation through files and buffers in Vim, speeding up your work with templates, auto-completion, folding, sessions, and registers, and formatting text and code, including using external formatting scripts. The final comprehensive chapter covers everything about using Vim scripts and scripting to extend functionality. Vim stands for Vi IMproved and is the editor of choice for programmers looking for a highly configurable, stable, open-source, multi-platform text editor. It is included with almost every Linux distribution as the standard text editor, and can be used to work with source code from any language. A big advantage… [detailed...]

ISBN: 1847190936
Book size: —; Page extent: 228.

 

PUT TO
THE BASKET
Shreeraj Shah
Hacking Web Services (Internet Series)

2006 y.
Publisher: —
Description: Web Services are an integral part of next generation Web applications. The development and use of these services is growing at an incredible rate, and so too are the security issues surrounding them. Hacking Web Services is a practical guide for understanding Web services security and assessment methodologies. Written for intermediate-to-advanced security professionals and developers, the book provides an in-depth look at new concepts and tools used for Web services security. Beginning with a brief introduction to Web services technologies, the book discusses Web services assessment methodology, WSDL -- an XML format describing Web services as a set of endpoints operating on SOAP messages containing information -- and the need for secure coding. Various development issues and open source technologies used to secure and harden applications offering Web services are also covered. Throughout the book, detailed case studies, real-life demonstrations, and a variety of tips and techniques… [detailed...]

ISBN: 1584504803
Book size: —; Page extent: 352.

 

PUT TO
THE BASKET
Kevin Beaver, Peter T. Davis
Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech))

2005 y.
Publisher: —
Description: Become a cyber-hero - know the common wireless weaknesses `Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.` --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who`d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network`s armor. Discover how to: Perform ethical hacks without compromising a system Combat denial of service and WEP attacks Understand how invaders think Recognize the effects of different hacks Protect against war drivers and rogue devices [detailed...]

ISBN: 0764597302
Book size: —; Page extent: 362.

 

PUT TO
THE BASKET
Johnny Long
Hacking con Google/ Hacking with Google (Hackers Y Seguridad / Hackers and Security)

2005 y.
Publisher: —
Description: - [detailed...]

ISBN: 8441518513
Book size: —; Page extent: 508.

 

PUT TO
THE BASKET
Kevin Beaver
Hacking for Dummies

— y.
Publisher: —
Description: `Ethical hacking` is the process of entering into a hacker`s mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities. * Shows readers how to approach their system security from the hacker`s perspective and perform nondestructive penetration testing * Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them * Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized [detailed...]

ISBN: 076455784X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Mark Burnett
Hacking the Code: Auditor`s Guide to Writing Secure Code for the Web

— y.
Publisher: —
Description: More of a programmer`s guide than a security guide, Hacking the Code explains how certain code can be attacked, shows how you should edit the code, and offers case studies and examples for doing so. The book establishes policies for object input, and shows how to audit existing code for potential security problems. People constantly ask security expert Mark Burnett for a guide to writing secure code. They don`t want a course on security, they want to fix their code. This book is a practical guide on how to maintain session state, how to properly handle cookies, how to get user input, and more. Instead of just telling you how to do it, Burnett shows actual code that can be dropped right into your applications. This book covers almost all security issues known. Burnett has put hundreds of hours of research into his code audit database and is now making that available to you. [detailed...]

ISBN: 1932266658
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Arthur Kroker, Marilouise Kroker, Marilo Ise Kroker
Hacking the Future: Stories for the Flesh-Eating 90s (CULTURETEXTS)

— y.
Publisher: —
Description: Hacking the Future tells the story of what happens when information technology escapes the high tech labs of Silicon Valley and invades the sites of everyday culture. It includes some of the survival tales of people who just want to feel again in a culture that is numbed and purified. A spoken word CD is included. [detailed...]

ISBN: 0312129556
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
douglas Chick
Hacking the IT Cube: The Information Technology Department Survival Guide

2006 y.
Publisher: —
Description: Hacking the Cube is a straightforward and sometimes comical look into the everyday world of information technology. It answers questions that many IT professionals and newcomers ask about the tools and skills needed to survive one of the most complex career fields in the world. Most computer books deal with configuring software and do little to help you learn what you need to know to work in a network office environment. Most people are rarely prepared for the social, political, or psychological aptitude needed to survive the office workplace. Most computer books are software proprietary and never tell you what types of programs you will really need to know. Many of the topics in this book are situations based on my experience and the experiences of other computer professionals that you would not typically have access to without actually having a job in an IT department.It also contains notes sent to me from well-established IT professionals about their experiences. This book is… [detailed...]

ISBN: 0974463027
Book size: —; Page extent: 300.

 

PUT TO
THE BASKET
William Von Hagen
Hacking the TiVo

— y.
Publisher: —
Description: If you own a TiVo, youre already aware of its awesome built-in capabilities. Wouldnt it be cool if you could make your TiVo do even more? Now you can! `Hacking the TiVo` covers the tools that are available to do just that, including MFS Tools, boot-page,monte, BlessTiVo, and many more. Learn what they are, how they work, and what TiVo model theyre meant for. To ensure that all your hard work is never lost, youll discover how to back up and restore your TiVo data. Want to expand your TiVos storage capacity? Youll learn how to replace your TiVo disk with a larger one and how to add a second drive. Want to put a new or old TiVo on your home network? Clear instructions explain how to get access to the machine to install and start popular applications and network services. Dont limit the power of your TiVo! Integrate it with caller ID and AOL Instant Messenger, utilize it for news and sports updates, and use it to display photos and play music. From the hidden menus of the TiVo user… [detailed...]

ISBN: 1592001114
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Andrew Huang
Hacking the Xbox: An Introduction to Reverse Engineering

— y.
Publisher: —
Description: — [detailed...]

ISBN: 1593270291
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Michael Flenov
Hackish C++ Games &, Demos

2006 y.
Publisher: —
Description: This guide to maximizing visual effects and optimizing graphics for game programming with C++ and DirectX is a practical introduction to the latest C++ technologies and techniques. The new concept of demo coding—a program whose purpose is to present the technical and artistic skills of programmers—is provided, as is help for programmers demonstrating their new skills in creating 2-D and 3-D games and demo scenes. An accompanying CD-ROM includes demo scenes, game-development projects, and examples from the book. [detailed...]

ISBN: 1931769583
Book size: —; Page extent: 350.

 

PUT TO
THE BASKET
Michael Flenov
Hackish PHP Pranks &, Tricks

2006 y.
Publisher: —
Description: Concentrating on PHP script programming, this book considers Web security and optimization from the hacker`s point of view. The many utilities used by hackers and written with PHP, examples of secure applications and algorithms for scripts, new ways of writing real hacking programs for the Web and nonstandard PHP programming techniques and possibilities. Programmers will also learn what tricks to expect from a hacker and how to create the most effective protection system possible are all discussed in detail. [detailed...]

ISBN: 1931769524
Book size: —; Page extent: 300.

 

PUT TO
THE BASKET

Had Gadya: A Passover Song

2009 y.
Publisher: —
Description: Designed to provoke the curiosity of children, Had Gadya is the traditional cumulative song that ends the Passover Seder. Internationally acclaimed artist Seymour Chwast provides a fresh look at Had Gadya with a bright, spring palette in a charming folk-art style. Rabbi Michael Strassfeld provides a thought-provoking afterword on the symbolism of this beloved song. [detailed...]

ISBN: 0312535708
Book size: —; Page extent: 32.

 

PUT TO
THE BASKET
Sara Douglass
Hades` Daughter (The Troy Game, Book 1)

2003 y.
Publisher: Tor Books
Description: In the ancient world, Crete is not the only land with a Labyrinth at its heart. Labyrinth magic protects Troy and the Greek city-states, as well. Then Theseus steals away Ariadne, Mistress of the Cretan Labyrinth, who for love of him betrayed her own father. But Theseus abandons Ariadne for her sister, and in revenge, Ariadne unweaves the magic of all the world`s remaining Labyrinths, unleashing an age of catastrophe. The gods weaken, Atlantis sinks, and Troy falls. Then Brutus, the warrior king of lost Troy, is promised a new Troy and a new Labyrinth if he carries out the destructive will of a mysterious, beautiful figure who appears to him in visions. But is she the goddess Artemis, as she claims, or a vengeful woman who has abandoned both mortality and mercy? Hades` Daughter is a dark, bloody epic of power, passion, and betrayal. The opening is bumpy--which is no surprise, for the early events range from Theseus`s treachery to the fall of Troy and beyond. The prose and… [detailed...]

ISBN: 0765305402
Book size: —; Page extent: 592.

 

PUT TO
THE BASKET
Leo Tolstoy
Hadji Murad (Modern Library Classics)

2003 y.
Publisher: —
Description: Book DescriptionIn 1851 Leo Tolstoy enlisted in the Russian army and was sent to the Caucasus to help defeat the Chechens. During this war a great Avar chieftain, Hadji Murad, broke with the Chechen leader Shamil and fled to the Russians for safety.Months later, while attempting to rescue his family from Shamil’s prison, Hadji Murad was pursued by those he had betrayed and, after fighting the most heroic battle of his life, was killed. Tolstoy, witness to many of the events leading to Hadji Murad’s death, set down this story with painstaking accuracy to preserve for future generations the horror, nobility, and destruction inherent in war.Download DescriptionThis Hadji Murad was Shamil`s naib, famous for his exploits, who used never to ride out without his banner and some dozens of murids, who caracoled and showed off before him. Now wrapped in a hood and burka, from under which protruded a rifle, he rode, a fugitive with one murid only, trying to… [detailed...]

ISBN: 0812967119
Book size: —; Page extent: 192.

 

PUT TO
THE BASKET
Tolstoy, Lev
Hadji Murad TPB

2003 y.
Publisher: —
Description: - [detailed...]

ISBN: 9780812967111
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Dietrich, William
Hadrian`s Wall, Dietrich, William

2005 y.
Publisher: —
Description: A fusion of Steven Pressfield`s `Gates of Fire` and the movie `Braveheart`, this is a novel of ancient warfare, lethal politics, and the final great clash of Roman and Celtic culture. [detailed...]

ISBN: 0060563729
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Hadrian`s Wall: Explorer Map

2007 y.
Publisher: Ordnance Survey
Description: Explorer Map - Active is an encapsulated product that is tough, durable and weatherproof. The maps are covered in a protective plastic coating that can be written on, so your favourite routes can be easily highlighted. They are also lightweight and compact, just right for the active map user. Scale - 1:25 000. 4 cm to 1 km, 2,5 inches to 1 mile. [detailed...]

ISBN: 0-319-46119--8
Book size: —; Page extent: 2.

 

PUT TO
THE BASKET
Darlene R. Stille
Hadrosaurus (North American Dinosaurs)

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 1600442528
Book size: —; Page extent: 24.

 

PUT TO
THE BASKET
Лев Толстой
Hadschi Murat

1985 y.
Publisher: Diogenes
Description: Allen ubrigen voran ritt auf einem weissmahnigen Pferde ein Mann von eindrucksvollem Ausseren, mit einem Turban um die Lammfellmutze und mit kostbaren, goldverzierten Waffen im Gurtel. Es war kein anderer als Hadschi Murat. … Poltorazkij hatte sich den kuhnen Anfuhrer der Bergbewohner ganz anders vorgestellt. Er erwartete einen finsteren, trockenen, absonder-lichen Menschen zu sehen, und nun erblickte er einen harmlos schlichten Mann vor sich, der so gutmutig lachelte, als sei er ein alter Freund und Vertrauter. Hadschi Murat, der ruhmreiche Fuhrer eines kaukasischen Bergstammes, stellt sich im kaukasischen Krieg in die Dienste der feindlichen Russen. Morgen- und Abendland treffen in Tolstois Erzahlung konfliktreich aufeinander. Dieser Band vereint 20 Erzahlungen: `Hadschi Murat`, `Alioscha, der Topf`, `Das Gottliche und das Menschliche`, `Was ich im Traum sah` u.v.a.m. [detailed...]

ISBN: 978 3 257 21361 4, 3 257 21361 1
Book size: 115x185; Page extent: 640.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz