Listing 1 - 10 of 78 << page
of 8
>>
Sort by
The cathedral and the bazaar : musings on Linux and Open source by an accidental revolutionary
Authors: ---
ISBN: 9781565927247 1565927249 Year: 1999 Publisher: Sebastopol (Calif.): O'Reilly,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Masters of deception : the gang that ruled cyberspace
Authors: ---
ISBN: 0060926945 Year: 1996 Publisher: New York (N.Y.) : HarperPerennial,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hacking the Xbox : an introduction to reverse engineering
Author:
ISBN: 1593270291 Year: 2003 Publisher: San Francisco (Calif.) : No Starch Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

InfoSec career hacking
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh

Stealing the network
Author:
ISBN: 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not


Book
A Hacker's Guide to Project Management.
Author:
ISBN: 1136400257 1281002828 9786611002824 0080472885 9780080472881 9781136400254 9781136400209 1136400206 9781136400247 1136400249 9781138461123 1138461121 0750657464 9780750657464 Year: 2003 Publisher: New York : Florence : Routledge Taylor & Francis Group [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.


Book
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing
Author:
ISBN: 1484272587 1484272579 Year: 2021 Publisher: Berkeley, CA : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
L'éthique des hackers
Authors: ---
ISBN: 9782211204101 2211204104 Year: 2013 Publisher: Paris: Globe,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Précision : un "hacker" n'est pas un vulgaire "pirate informatique". Un hacker est un "bricoleur de code". Son truc : plonger dans les entrailles de la machine. Bill Gates, Steve Jobs, Steve Wozniak, Mark Zuckerberg ont commencé leurs brillantes carrières comme hackers... La plupart ne paient pas de mine mais tous partagent une même philosophie, une idée simple et élégante comme la logique qui gouverne l'informatique : l'ouverture, le partage, le refus de l'autorité et la nécessité d'agir par soi-même, quoi qu'il en coûte, pour changer le monde. C'est ce que Steven Levy appelle l'Ethique des hackers, une morale qui ne s'est pas exprimée dans un pesant manifeste, mais que les hackers authentiques ont mise en pratique dans leur vie quotidienne. Ce sont eux qui ont oeuvré, dans l'obscurité, à la mise en marche de la révolution informatique. Depuis les laboratoires d'intelligence artificielle du MIT dans les années 1950 jusqu'aux gamers des années 1980, en passant par toutes les chambres de bonne où de jeunes surdoués ont consacré leurs nuits blanches à l'informatique, Steven Levy les a presque tous rencontrés. Voici leur histoire.

Hacker culture
Author:
ISBN: 0816633452 Year: 2002 Publisher: Minneapolis (Minn.) : University of Minnesota press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Game console hacking : have fun while voiding your warranty
Authors: --- ---
ISBN: 1281019917 9786611019914 0080532314 1931836310 1597490016 9781597490016 9780080532318 9781931836319 9781281019912 661101991X Year: 2004 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The worldwide video game console market surpassed 10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed ""retro gaming"" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.

Listing 1 - 10 of 78 << page
of 8
>>
Sort by