free tracker
Categories Unlimited Books

Black Hat Physical Device Security: Exploiting Hardware and Software

Black Hat Physical Device Security Shows readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more. This book details methods for attacking and defending physical security devices.

Rohan Nation

Pub Date : 2010-04-30 | Author : Drew Miller | Publisher : Dr Drew Miller, Col (Ret)

ISBN 10 : 9780984370900
ISBN 13 : 0984370900

Rohan Nation tells how survivors of biological warfare and electro-magnetic pulse fight to defend and reinvent America. The disasters that lead to the collapse of the U.S. in 2020 ..

The Mobile Application Hacker S Handbook

Pub Date : 2015-06-11 | Author : Dominic Chell | Publisher : John Wiley & Sons

ISBN 10 : 9781118958520
ISBN 13 : 1118958527

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications..

Ninja Hacking

Pub Date : 2010-11-02 | Author : Thomas Wilhelm | Publisher : Elsevier

ISBN 10 : 1597495891
ISBN 13 : 9781597495899

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices..

Penetration Testing

Pub Date : 2014-06-14 | Author : Georgia Weidman | Publisher : No Starch Press

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..

Leave a Reply

Your email address will not be published. Required fields are marked *