This is a pocket reference for getting started Raspberry Pi.
**TOC** 1. Introduction to Raspberry Pi 1.1 Raspberry Pi 1.2 Getting Hardware 2. Raspberry Pi Software 2.1 Raspberry Pi Operating Sys……続きを見る
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and ……続きを見る
Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of Linux is the Linux kernel, an operat……続きを見る
著者:Misha Glenny
出版社: Knopf Doubleday Publishing Group
発売日: 2011年10月04日
"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." --Roberto Saviano, author of Gommorah
The benefits……続きを見る
If You Are A Computer Owner, Do Not Go Without Anti-Virus Software, Anti-Virus Protection, Anti-Virus Software Downloads, Anti-Virus Comparison, Windows Anti-Virus and Anti-Virus Scanning
続きを見る
著者:Chris McNab
出版社: O'Reilly Media
発売日: 2009年02月09日
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution b……続きを見る
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, t……続きを見る
Social media, texting and the Internet have given oppressed people the power to organize, communicate dissent and help lead revolutions throughout the world. While the Arab Spring in 2011 brought at……続きを見る
著者:Lee Allen
出版社: Packt Publishing
発売日: 2012年05月22日
An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with m……続きを見る
著者:Misha Glenny
出版社: Knopf Doubleday Publishing Group
発売日: 2011年10月25日
In DarkMarket: Cyberthieves, Cybercops and You, Misha Glenny plunged into the murky depths of the world’s most notorious carder fraud site, DarkMarket. In this exclusive short eBook, he takes you ev……続きを見る
What every parent needs to read before letting their children online. Covering all the major issues and threats across the net, social networks covered in detail. If you only read one book this year……続きを見る
This book is a step-by-step tutorial that will teach you everything you need to know about the deployment and management of FortiGate, including high availability, complex routing, various kinds of ……続きを見る
Facebook ist aus dem heutigen Leben nicht mehr wegzudenken. Gerade als Firma oder Verein muss man auf diesem großen sozialen Netzwerk vertreten sein.
Dabei gibt es jedoch vieles zu beac……続きを見る
This is the first book of its kind to offer comprehensive and easy to follow advice for adults and the parents of minors who suffer form the unwanted attention of cyber bullies and stalkers. How to ……続きを見る
If Youíre Looking For A Great eBook On Domain Name, How To Pick One, Appraisal Information, Name Dispute, Email Forwarding Secrets and Free Services!
続きを見る
Au printemps 2013, des milliers de documents classés top secret ont été remis à une équipe de journalistes par un ancien employé des services de renseignements américains, Edward Snowden.
Le système……続きを見る
An E-Guide written for the very novice. College graduate, military trained and battle hardened author. This is THE definitive guide on becoming completely invisible on the World Wide Web. T……続きを見る
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in inf……続きを見る
This publication, Field Manual FM 6-02 Signal Support to Operations, describes the Signal Regiment support to the Army’s mission, commanders, staff officers and signal personnel. This manual establi……続きを見る
Internet fait désormais partie intégrante de notre vie, mais pensez vous maîtriser votre présence sur cet espace? Dans ce guide pratique, vous trouverez tous nos con……続きを見る
Security and Privacy threats on Facebook are real. These threats have gone beyond the Internet and computer systems, and have become real life threats. The looming danger generated by a simple mouse……続きを見る
著者:Lance Hayden
出版社: McGraw Hill LLC
発売日: 2010年08月22日
Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data pr……続きを見る
Securely deploy iPads and iPhones on corporate networks
Seamlessly integrate iPads and iPhones into your company's IT systems using the detailed instructions contained in this practical book. iPad &……続きを見る
In-depth counterintelligence tactics to fight cyber-espionage
"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot
Expose, pursue, and prosecute the perpetrato……続きを見る
The best fully integrated CompTIA Security+ self-study package featuring 1200+ practice exam questions. Save 12% on this Boxed Setーwith bonus electronic content!
CompTIA Security+ Certification Box……続きを見る
Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & ……続きを見る
Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring……続きを見る
著者:Mark O'Neill
出版社: McGraw Hill LLC
発売日: 2012年09月01日
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You’ll also find details on Security Asserti……続きを見る