Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...
Apache The Definitive Guide, 3rd Edition Updated to cover the changes in Apache's latest release, 2.0, as well as Apache 1.3, this useful guide discusses how to obtain, set up, secure, modify, and troubleshoot the Apache software on both Unix and Windows systems. In addition to covering the installation and configuration of mod_perl and Tomcat, the book examines PHP,... Prototyping: A Practitioner's Guide
What’s the difference between theory
and practice? Albert Einstein once
said, “In theory they are the same.
In practice, they are not.”
Practice makes perfect. Champion sports
teams practice constantly. Zen masters will tell
you that the only way to achieve enlightenment
.NET Compact Framework 3.5 Data Driven Applications
Both the SQL Server Lite and Oracle Lite mobile databases are covered in detail, from data access to data synchronization. The book explains how device features such as Bluetooth, SMS, telephony, Infrared, and Windows Contacts can be accessed via .NET CF in a real-world example, namely the mobile sales-force application. It also explains.NET...
Resource-Adaptive Cognitive Processes (Cognitive Technologies)
This book investigates the adaptation of cognitive processes to limited resources. The central topics of this book are heuristics considered as results of the adaptation to resource limitations, through natural evolution in the case of humans, or through artificial construction in the case of computational systems; the construction and...