Listing 1 - 10 of 80 | << page >> |
Sort by
|
Choose an application
Operating systems (Computers) --- Computer software --- Computer hackers.
Choose an application
Computer crimes --- Computer hackers --- Computer security --- Gangs
Choose an application
Computer hackers. --- Computer security. --- Reverse engineering.
Choose an application
"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh
Computer. Automation --- Computer hackers. --- Computer security. --- Hackers.
Choose an application
""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not
Computer. Automation --- Computer hackers --- Short stories.
Choose an application
Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.
Computer software
---
Computer hackers.
---
Development
---
Management.
---
Hackers.
Choose an application
Computer security --- Hackers. --- Examinations --- Computer hackers --- Computer programmers --- Computer users
Choose an application
Précision : un "hacker" n'est pas un vulgaire "pirate informatique". Un hacker est un "bricoleur de code". Son truc : plonger dans les entrailles de la machine. Bill Gates, Steve Jobs, Steve Wozniak, Mark Zuckerberg ont commencé leurs brillantes carrières comme hackers... La plupart ne paient pas de mine mais tous partagent une même philosophie, une idée simple et élégante comme la logique qui gouverne l'informatique : l'ouverture, le partage, le refus de l'autorité et la nécessité d'agir par soi-même, quoi qu'il en coûte, pour changer le monde. C'est ce que Steven Levy appelle l'Ethique des hackers, une morale qui ne s'est pas exprimée dans un pesant manifeste, mais que les hackers authentiques ont mise en pratique dans leur vie quotidienne. Ce sont eux qui ont oeuvré, dans l'obscurité, à la mise en marche de la révolution informatique. Depuis les laboratoires d'intelligence artificielle du MIT dans les années 1950 jusqu'aux gamers des années 1980, en passant par toutes les chambres de bonne où de jeunes surdoués ont consacré leurs nuits blanches à l'informatique, Steven Levy les a presque tous rencontrés. Voici leur histoire.
Société numérique --- Média --- Internet --- Computer programming --- Computer hackers
Choose an application
Computer hackers. --- Computer programming --- Moral and ethical aspects.
Choose an application
The worldwide video game console market surpassed 10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed ""retro gaming"" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.
Computer games --- Computer hackers. --- Programming. --- Computer hackers --- Computer game programming --- Game programming (Computer games) --- Computer programmers --- Computer users --- Computer programming --- Programming --- Video games --- Hackers.
Listing 1 - 10 of 80 | << page >> |
Sort by
|