Listing 1 - 9 of 9 |
Sort by
|
Choose an application
The worldwide video game console market surpassed 10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed ""retro gaming"" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.
Computer games --- Computer hackers. --- Programming. --- Computer hackers --- Computer game programming --- Game programming (Computer games) --- Computer programmers --- Computer users --- Computer programming --- Programming --- Video games --- Hackers.
Choose an application
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book co
Choose an application
Choose an application
The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do. By definition, video console game players like to have fun. Most of them are addicted to the adrenaline rush associated with "winning", and even more so when the "winning" involves beating the system by discovering the multitude of "cheats" built into most video games. Now, they can have the ultimate adrenaline rush---actually messing around with the soul of the machine and configuring it to behave exactly as the command. This book builds on the motto of "Have Fun While Voiding Your Warranty" and will appeal to the community of hardware geeks who associate unscrewing the back of their video console with para-jumping into the perfect storm. * Providing a reliable, field-tested guide to hacking all of the most popular video gaming consoles. * Written by some of the most knowledgeable and recognizable names in the hardware hacking community. * Game Console Hacking is the first book on the market to show game enthusiasts (self described hardware geeks) how to disassemble, reconfigure, customize and re-purpose their Atari, Sega, Nintendo, Playstation and Xbox systems.
Choose an application
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive.
Choose an application
Choose an application
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a.
Consumer behavior --- Mass communications --- Computer architecture. Operating systems
Choose an application
Choose an application
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID syst
Consumer behavior --- Mass communications --- Computer architecture. Operating systems --- Data transmission systems. --- Radio frequency. --- Radiofrequency --- Frequencies of oscillating systems --- Radio measurements --- Radio waves --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Data transmission systems --- Radio frequency --- E-books --- Information Technology --- General and Others --- 681.3*D47 --- 681.3*C21 --- 6813*C20 --- 681.3*C21 Network architecture and design: networks (centralized, circuit switching, distributed, packet, store and forward); network communications; netword topology --- Network architecture and design: networks (centralized, circuit switching, distributed, packet, store and forward); network communications; netword topology --- 681.3*D47 Organization and design: batch processing systems; distributed systems; hierarchical design; interactive systems; real-time systems (Operating systems) --- Organization and design: batch processing systems; distributed systems; hierarchical design; interactive systems; real-time systems (Operating systems) --- Computer-communication networks: general: data communications, opensystems interconnection reference model (OSI), security and protection (e.g., firewalls)
Listing 1 - 9 of 9 |
Sort by
|