e99 Online Shopping Mall
Help | |
Home - Computer - Hacking (Books) |
  | Back | 81-100 of 100 |
click price to see details click image to enlarge click link to go to the store
81. Hacking MySpace: Mods and Customizations to make MySpace Your Space (ExtremeTech) by John Pospisil | |
Paperback: 408
Pages
(2006-08-28)
list price: US$24.99 -- used & new: US$0.84 (price subject to change: see help) Asin: 0470045841 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description It's YourSpace There are over 90 million profiles on MySpace. How do you make yours stand out? You use these programming tricks and techniques to tweak the look, feel, and content of your profile. You get the inside scoop on hot design and photography. You maximize the effects of HTML and CSS. And, if you happen to be a musician, you check out Chapter 30 to see how MySpace can launch your career. It's all in here. What are you waiting for? Make it all about you. Complete code and instructions for these and more MySpace hacks: A companion Web site provides even more tricks and techniques. Visit www.myspaceismyplace.com to find all code from this book, links to software and featured profiles, a reader forum, and more. Customer Reviews (12)
Outdated Rubbish
amazing book
Hacking My Space
Good if You're a Beginner
A good resource |
82. Windows 2000 (Hacking Exposed) by Joel Scambray, Stuart McClure | |
Paperback: 500
Pages
(2001-08-29)
list price: US$49.99 -- used & new: US$2.63 (price subject to change: see help) Asin: 0072192623 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Joel Scambray and Stuart McClure have chosen to organize their book according to the steps involved in system compromise (identifying a target, gaining access and privileges, using or destroying the system, and so on) as well as by area of vulnerability. In addition to well-written passages that explain general hacking strategies and concepts, the authors devote sections to software (meaning native Windows commands, tools that are part of the Windows NT/2000 Resource Kit, as well as external software). Sometimes, they'll just offer a description, but most of the time, the authors present a step-by-step guide to carrying out the exploit at hand. This is a valuable book that every Windows 2000 expert should read closely. --David Wall Topics covered: How to break into a Windows 2000 system and, by extension, how to go about defending against attacks. Sections deal with tools for locating victim systems, gaining access to them, and either damaging them, overloading them, or using them as bases for further attacks. The authors also highlight the weaknesses in Windows 2000 services, including Internet Information Services (IIS) and Microsoft SQL Server. Customer Reviews (23)
Hacking exposed: excellent books
Buy this book if you use windows
The best security manual I have ever seen
Excellent book - useful from the first read
Excellent security book |
83. Hacking Red Hat Enteprise Linux by Paul T. Ammann | |
Perfect Paperback: 200
Pages
(2009-10-19)
list price: US$29.99 -- used & new: US$17.99 (price subject to change: see help) Asin: 0557163110 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (1)
Hands-on Red Hat Linux Manual |
84. Designing BSD Rootkits: An Introduction to Kernel Hacking by Joseph Kong | |
Paperback: 144
Pages
(2007-04-10)
list price: US$29.95 -- used & new: US$21.86 (price subject to change: see help) Asin: 1593271425 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (4)
A perfect programmer's guide.
Concise, informative, powerful -- a real winner
Enjoyable primer on system kernel penetration
Fun and informative |
85. Hacking iPod and iTunes (ExtremeTech) by Scott Knaster | |
Paperback: 312
Pages
(2004-08-13)
list price: US$24.99 -- used & new: US$4.47 (price subject to change: see help) Asin: 0764569848 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Hacking iPod and iTunes teaches readers everything needed to use the most obscure and least documented features of Apple's software, but that's just the starting point. For the dedicated, hardcore iPod users who are ready to really unlock the potential of this great hardware device, Hacking iPod and iTunes reveals the secrets of more than 100 hacks, tweaks and mods, unlocking both the musical and non-musical tricks in the iPod's repertoire. With Hacking iPod and iTunes, readers will roll up their sleeves, put on their headphones, and groove to iPod and iTunes hacks including: and so much more – over 100 hacks, tweaks and mods for the world’s most popular music player and software. Customer Reviews (13)
OK but dated
Thanks
Not hacking or insightful.
Hacking in the sense that bubblegum is food
the cool reality of your ipod |
86. Hacking VoIP: Protocols, Attacks, and Countermeasures by Himanshu Dwivedi | |
Paperback: 220
Pages
(2008-03-21)
list price: US$44.95 -- used & new: US$23.14 (price subject to change: see help) Asin: 1593271638 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to: Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense. Customer Reviews (2)
An Excellent VoIP Security manual
Great resource to understand VoIP security |
87. Chained Exploits: Advanced Hacking Attacks from Start to Finish by Andrew Whitaker, Keatron Evans, Jack B. Voth | |
Paperback: 312
Pages
(2009-03-09)
list price: US$49.99 -- used & new: US$25.49 (price subject to change: see help) Asin: 032149881X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. Now there’s a book that brings together start-to-finish information about today’s most widespread chained exploits–both how to perform them and how to prevent them. Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today’s most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering. Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today’s most effective countermeasures— both technical and human. Coverage includes: Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council’s Instructor of Excellence Award. Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council’s Instructor of Excellence Award. Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad. informit.com/aw Cover photograph © Corbis / Jupiter Images $49.99 US $59.99 CANADA Customer Reviews (14)
Well written and easy read
Just OK
Each attack is analyzed one step at a time
A multi-scenario hacking adventure novel focused on combined real-world attacks.
Fun Read, Useful for Folks New to Security |
88. Hacking Timbuktu by Stephen Davies | |
Hardcover: 272
Pages
(2010-11-15)
list price: US$16.00 -- used & new: US$11.42 (price subject to change: see help) Asin: 0547390165 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (3)
Big adventure, high interest novel
International adventure galore!
"From here on in it's all catting and hacking." |
89. Hacking Photoshop CS2 by Shangara Singh | |
Paperback: 454
Pages
(2005-10-21)
list price: US$29.99 -- used & new: US$3.61 (price subject to change: see help) Asin: 0764597884 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description This is serious, down and dirty, tweaking – blowing away the default settings, customizing appearance, optimizing performance, customizing tools and offering readers total control over Photoshop like never before. With these 300+ hacks, readers will find their work with Photoshop faster and easier than ever. Roll up your sleeves, and dive into these hacks including: and so much more. Customer Reviews (9)
Not for New Users
Love the layout and approach
A Great At-Desk Reference
Keep on Hacking!
Wheat and Chaff |
90. Hacking the TiVo, 2nd Edition by William von Hagen | |
Paperback: 456
Pages
(2004-07-31)
list price: US$29.99 -- used & new: US$9.99 (price subject to change: see help) Asin: 1592004814 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (6)
not very useful
Not very enlightening
Excellent Book, Pathetic Editing
System information
DirecTV Tivo System-2 software Updates - now 6.1 |
91. Take a Walk: 100 Walks Through Natural Places in the Puget Sound Region by Sue Muller Hacking | |
Paperback: 256
Pages
(2003-07)
list price: US$16.95 -- used & new: US$3.95 (price subject to change: see help) Asin: 1570613265 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (4)
Good review of Parks only
Take a Walk - Get out there! Inspiring
Great for Olympia, WA
A good guide to Seattle parks This would be a good book for families with young children, because most of the parks seem to be "family friendly" and you will have essential information on facilities.You will also have 100 ideas of places to visit that are a short drive from Everett, Seattle, Bellevue, Tacoma or Olympia. I was rather disappointed with this book as I was expecting to find a book of short hikes on non-paved trails.I had the distinct impression that I could have put together a similar book by contacting the Parks and Recreation Department and asking them to send me flyers on each park.There is also a dearth of historical information. If you are new to Seattle and want a concise guide to the many different parks and trails of the region, then this book might be just what you are looking for.If you are a day hiker looking for some varied, challenging and interesting trails, look elsewhere. ... Read more |
92. Internet Security: Hacking, Counterhacking ,and Security by Kenneth Einar Himma | |
Paperback: 304
Pages
(2006-10-05)
list price: US$66.95 -- used & new: US$6.03 (price subject to change: see help) Asin: 0763735361 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
93. Hacking Exposed Linux, 3rd Edition by ISECOM | |
Paperback: 614
Pages
(2008-07-15)
list price: US$49.99 -- used & new: US$26.45 (price subject to change: see help) Asin: 0072262575 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Customer Reviews (9)
Not about hacking Linux
1st and 2nd editions better
Good book, but little news
Solid Information
Fantastic Security Resource |
94. A concise introduction to logic by Ian Hacking | |
Paperback: 337
Pages
(1972)
Isbn: 039431008X Canada | United Kingdom | Germany | France | Japan | |
95. Hacking: Digital Media and Technological Determinism (Digital Media and Society) by Tim Jordan | |
Paperback: 200
Pages
(2008-11-03)
list price: US$19.95 -- used & new: US$14.22 (price subject to change: see help) Asin: 0745639720 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
96. Hacking Cyberspace (Polemics Series,) (Volume 0) by David J. Gunkel | |
Paperback: 256
Pages
(2001-03-16)
list price: US$38.00 -- used & new: US$38.00 (price subject to change: see help) Asin: 0813336694 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (3)
Don't be so Literal
Well documented but... Still good if you want to know more on cyberspace and philosophy.
ConsequencesofHacking |
97. Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier by Suelette Dreyfuss | |
Paperback: 324
Pages
(1997-06-06)
Isbn: 1863305955 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Customer Reviews (1)
Hacking from the Commonwealth |
98. Gray Hat Hacking : The Ethical Hacker's Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester | |
Paperback: 434
Pages
(2004-11-09)
list price: US$49.99 -- used & new: US$8.00 (price subject to change: see help) Asin: 0072257091 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (16)
Ordered used, looks new
Great book
thisbook is a waste of good paper
Another revolutionary book from a revolutionary author!
A good guide for the beginner ethical hacker. |
99. Practical Hacking Techniques and Countermeasures by Mark D. Spivey | |
Hardcover: 752
Pages
(2006-11-02)
list price: US$87.95 -- used & new: US$59.35 (price subject to change: see help) Asin: 0849370574 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
Instructor Review
Above and Beyond |
100. Hacking a Terror Network: The Silent Threat of Covert Channels by Russ Rogers, Matthew G Devost | |
Paperback: 448
Pages
(2005-02-10)
list price: US$41.95 -- used & new: US$21.99 (price subject to change: see help) Asin: 1928994989 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (10)
Terrible story, no plot, poorly researched
Pathetic nonsense
Interesting and Provocative Story
Good intro to stenography and its uses.
On The Internet They Won't Know You Are a Dog |
  | Back | 81-100 of 100 |