Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who ran...

Web Application Defender's Cookbook

Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookboo...

Hacker's Handbook

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is acc...

Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate netw...

IoT Hacker's Handbook

Take a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.¿¿ You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, ...

Car Hacker's Handbook

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven t kept pace with today s more hostile se...

iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and ...

Database Hacker's Handbook

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Databa...

XDA Developers' Android Hacker's Toolkit

Make your Android device truly your own Are you eager to make your Android device your own but you're not sure where to start? Then this is the book for you. XDA is the world's most popular resource for Android hacking enthusiasts, and a huge comm...

Web Application Hacker's Handbook

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or comp...

Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily pr...

RSPB Nature Tracker's Handbook

A complete guide to how to interpret the signs that animals leave behind. Every animal leaves some kind of trace as it passes and the art of tracking is very much like learning to read. If you learn to read the signs left by footprints, leftover f...

Android

#1 Best Seller! - Learn to Program Android Apps - in a Day! 2nd Edition What can this book do for you?Android: Programming Guide: Android App Development - Learn in a Day teaches you everything you need to become an Android App Developer from scra...

Hacking For Dummies

Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and disco...

The Android Malware Handbook

This comprehensive guide to Android malware introduces current threats facing the world's most widely used operating system. After exploring the history of attacks seen in the wild since the time Android first launched, including several malware families previously absent from the literature, you'll practice static and dynamic approaches to analysing real malware specimens. Next, you'll examine the machine-learning techniques used to detect malicious apps, the types of classification models that defenders can use, and the various features of malware specimens that can become input to these models. You'll then adapt these machine-learning strategies to the identification of malware categories like banking trojans, ransomware, and SMS fraud. You'll learn: How historical Android malware can elevate your understanding of current threats; How to manually identify and analyse current Android malware using static and dynamic reverse-engineering tools; How machine-learning algorithms can

Hacker's Delight

"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers...

Hacker's Mind

A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies....

Hacker's Mind

A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies....

Hackers

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pus...

Hackers

Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly. Hackers traces the exploits of innovators from the research labs in the late 1950s to the rise of the home computer in the mid-1980s. It's a fascinating story of brilliant and eccentric nerds such as Steve Wozniak, Ken Williams, and John Draper who took risks, bent the rules, and took the world in a radical new direction. 'Hacker' is often a derogatory term today, but 40 years ago, it referred to people who found clever and unorthodox solutions to computer engineering problems -- a practice that became known as 'the hacker ethic.' In this book, Levy takes you from the true hackers of MIT's Tech Model Railroad Club to the DIY culture that spawned the first personal computers -- the Altair and the Apple II -- and finally to the gaming

Hackers

"This is a threat." That's how Hackers, Swedish writer Aase Berg's seventh book of poetry, begins. Hackers is a furious, feminist book about wanting to "hack" the patriarchal system-both in the physically violent sense and in t...

Hackers

OBS! Import. Kontrollera att språk och textning passar dig.Jonny Lee Miller and Angelina Jolie star in this 1990s crime thriller. When 18-year-old Dade Murphy aka Zero Cool (Miller) moves to New York, he meets fellow hacker Kate Libby aka Acid Burns (Jolie) and joins her high school hacker club. However, their innocent duels quickly turn from adolescent hijinks to deadly industrial espionage when they are framed by nefarious hacker The Plague (Fisher Stevens) and are soon fighting for their lives.Typ: Blu-ray / 30th Anniversary Deluxe Edition

Beginning Android C++ Game Development

Beginning Android C++ Game Development introduces general and Android game developers like you to Android's powerful Native Development Kit (NDK). The Android NDK platform allows you to build the most sophisticated, complex and best performing gam...

Android Cookbook

Jump in and build working Android apps with the help of more than 230 tested recipes. The second edition of this acclaimed cookbook includes recipes for working with user interfaces, multitouch gestures, location awareness, web services, and speci...

Android Cookbook

Jump in and build working Android apps with the help of more than 230 tested recipes. The second edition of this acclaimed cookbook includes recipes for working with user interfaces, multitouch gestures, location awareness, web services, and speci...

Hello, Android

Google Android dominates the mobile market, and by targeting Android, your apps can run on most of the phones and tablets in the world. This new fourth edition of the #1 book for learning Android covers all modern Android versions from Android 4.1...

Android Programming

Unleash the power of the Android OS and build the kinds of brilliant, innovative apps users love to use If you already know your way around the Android OS and can build a simple Android app in under an hour, this book is for you. If you're itching...

Beginning Android

Learn how to develop applications for Android mobile devices using simple examples, ready to run with your copy of the software development kit. Author and Android columnist, writer, developer, and community advocate Mark L. Murphy shows you what ...

Android Essentials

Android Essentials is a no-frills, no-nonsense, code-centric run through the guts of application development on Google's Mobile OS. This book uses the development of a sample application to work through topics, focusing on giving developers the es...

Pro Android

Pro Android is the first book to include coverage of Google Android 1.5 SDK (including the branch formerly called Cupcake). This essential book covers the fundamentals of building applications for embedded devices thru through to advanced concepts...

Professional Android

The comprehensive developer guide to the latest Android features and capabilities Professional Android, 4th Edition shows developers how to leverage the latest features of Android to create robust and compelling mobile apps. This hands-on approach...

Decompiling Android

Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad An...

Android Recipes

Android continues to be one of the leading mobile OS and development platforms driving today's mobile innovations and the apps ecosystem. Android appears complex, but offers a variety of organized development kits to those coming into Android with...

Android Recipes

Android continues to be one of the leading mobile OS and development platforms driving today's mobile innovations and the apps ecosystem. Android¿appears complex, but offers a variety of organized development kits to those coming into Android with...

Hacking Android

Explore every nook and cranny of the Android OS to modify your device and guard it against security threats About This Book * Understand and counteract against offensive security threats to your applications * Maximize your device's power and pote...

Android Security

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programmin...

Programming Android

What does it take to build well-engineered Android applications? Explore Android's core building blocks and APIs in depth with this authoritative guide (updated to cover the Ice Cream Sandwich version of Android), and learn how to create compellin...

Learning Android

Want to build apps for Android devices? This book is the perfect way to master the fundamentals. Written by experts who have taught this mobile platform to hundreds of developers in large organizations and startups alike, this gentle introduction ...

Om Find.to

Find.to är ett verktyg som gör det enkelt att hitta information om produkter, med aktuella priser och detaljerat innehåll.

Med vår tjänst kan du skanna produkter, jämföra priser mellan butiker och få information om allergener och näringsinnehåll.


Kontakta: hi@find.to

Inställningar

Diet

Kostbaserad tolkning är endast vägledande och ersätter inte medicinsk rådgivning.

Allergivarningar

Inga allergier valda

Ange streckkodsnummer

Laddar kamera