著者:James K Lewis
出版社: Packt Publishing
発売日: 2017年07月19日
A quick and straightforward approach to writing shell scripts to accomplish different types of tasks on a Linux system. Key Features\*Understand expressions and variables and how to use them practic……続きを見る
著者:John E. Meister
出版社: John E. Meister, Jr
発売日: 2015年05月19日
Tests in this book show the performance differences of Linux vs. Microsoft Windows, XP, 7, 8, 8.1 and 10.
On a Dell D630 (4gb Memory) Linux took 33.6 seconds to run a test, Win 10 took 333.583 secon……続きを見る
In Linux Unwired, you'll learn the basics of wireless computing, from the reasons why you'd want to go wireless in the first place, to setting up your wireless network or accessing wireless data ser……続きを見る
Learn to build amazing robotic projects using the powerful BeagleBone Black.
About This Book
Push your creativity to the limit through complex, diverse, and fascinating projects
Develop application……続きを見る
Discover best practices and troubleshooting solutions when working on ROSKey FeaturesDevelop complex robotic applications using ROS to interface robot manipulators and mobile robotsGain insight into……続きを見る
Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and in……続きを見る
著者:Bruce Nikkel
出版社: No Starch Press
発売日: 2016年09月01日
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civi……続きを見る
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be ……続きを見る
著者:Michael Rash
出版社: No Starch Press
発売日: 2007年09月07日
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in……続きを見る
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but……続きを見る
The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interfaceーthe interface employed by nearly every application that runs on a Linux or UNIX system.
In……続きを見る
OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenB……続きを見る
著者:Joseph Kong
出版社: No Starch Press
発売日: 2012年05月12日
Device drivers make it possible for your software to communicate with your hardware, and because every operating system has specific requirements, driver writing is nontrivial. When developing for F……続きを見る
著者:Justin Seitz
出版社: No Starch Press
発売日: 2009年04月15日
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries tha……続きを見る
GNU make is the most widely used build automation tool, but it can be challenging to master and its terse language can be tough to parse for even experienced programmers. Those who run into difficul……続きを見る
Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But……続きを見る
Build, Manage and Improve your infrastructure effortlessly.Key Features\[\*\]An up-to-date and comprehensive resource on Terraform that lets you quickly and efficiently launch your infrastructure\[\……続きを見る
Ceci n’est pas votre livre commun sur le hacking. D’aucuns pourraient remarquer qu’il ne s’agit pas véritablement d’un livre ! En effet, ceci est un programme d’entrainement qui vous offre l’opportu……続きを見る
Here's what you will find in the Hackercool August 2017 Issue .
Malware Malware (Conclusion) : Cover Story : Worms, Spyware, Keylogger, Logic Bomb, Bots,Rootkit and Ransomware.
Installit : Insta……続きを見る
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make of……続きを見る
Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members.
Art of exploit……続きを見る
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make of……続きを見る
This is not your regular hacking book. Hell, some might say it is not even a book. This is a training program that gives you a free coupon to access dedicated and real machines with real flaws for 2……続きを見る
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make of……続きを見る
Optimize and boost your Linux-based system with Yocto Project and increase its reliability and robustness efficiently and cost-effectively.Key FeaturesOptimize your Yocto Project tools to develop ef……続きを見る
Over 79 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto Project know-howKey FeaturesOptimize your Yocto setup to speed up development and debug build is……続きを見る
Unleash the combination of Docker and Jenkins in order to enhance the DevOps workflowKey Features\[\*\] Build reliable and secure applications using Docker containers.\[\*\] Create a complete Contin……続きを見る