Listing 1 - 3 of 3 |
Sort by
|
Choose an application
""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'
Microcomputers --- Computer input-output equipment. --- Computer hackers. --- Reverse engineering. --- Maintenance and repair. --- Upgrading.
Choose an application
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and
Computer security. --- Reverse engineering. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Engineering --- Data protection --- Security systems --- Hacking --- Information Technology --- General and Others
Choose an application
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code.*Reverse Engineer REA
Debugging in computer science --- Computer security --- Reverse engineering --- Computer programs. --- IDA Pro (Electronic resource) --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Interactive Disassembler Professional --- Information Technology --- General and Others
Listing 1 - 3 of 3 |
Sort by
|