Canada has a rich and fascinating history. In this informative overview, kids will discover the people, places and events that have shaped our country. Featuring fact boxes, mini-profiles, maps, a timeline and more, this title in the acclaimed Kids Book of series offers a comprehensive and engaging [...]
A Primer on the Future of PR, Marketing and Advertising
A new generation of megabrands like Facebook, Dropbox, Airbnb, and Twitter haven't spent a dime on traditional marketing. No press releases, no TV commercials, no billboards. Instead, they rely on a new strategy--growth hacking--to reach m[...]
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately -protect vulnerabilities. You'll start wit[...]
"Hardware, says Bunnie Huang, is a world without secrets: if you go deep enough, even the most important key is expressed in silicon or fuses. His is a world without mysteries, only unexplored spaces. This is a look inside a mind without peer."--Edward Snowden
For over a decade, Andrew "bunni[...]
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices.After [...]
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies havent kept pace with todays more hostile security environment, leaving millions vulnerable to atta[...]
For over a decade, Andrew "e;bunnie"e; Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware [...]
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a compr[...]
Hack Your Personality Type to Overcome Obstacles and Achieve Success. Delve into this interactive guidebook to hack your mind and uncover your core identity. Get past superficial markers of identity and discover the full makings of your personality type. Recognizing all aspects of who you really are[...]
Hack Your Personality Type to Overcome Obstacles and Achieve Success.Delve into this interactive guidebook to hack your mind and uncover your core identity. Get past superficial markers of identity and discover the full makings of your personality type. Recognizing all aspects of who you really are [...]
ABOUT THE BOOKMicrosoft Excel is a user-friendly spreadsheet program that lets you organize data, create charts, program time-saving shortcuts, and make reports. It is part of the Microsoft Office Suite. There are multiple versions of Microsoft Excel out there, the latest being part of the Microsoft[...]
First published in 1993, "The Ultimate Cigar Book" has become a classic in its field, and is generally credited with having helped launch the current cigar smoking craze. It has been reprinted numerous times in the United States, and is now sold worldwide. No other book contains as much detailed and[...]
What is a growth hacker? growth hacker - one whose energy and center is pushing a metric through utilization of a testable and versatile system. "Growth hacker" is another word for many but a protracted command follow among the simplest net advertisers and products managers in geographical area. Wit[...]
EC-Council Certified Ethical Hacking (CEH) v10 Exam 312-50 Latest v10.
This updated version includes three major enhancement,
New modules added to cover complete CEHv10 blueprint.
Book scrutinized to rectify grammar, punctuation, spelling and vocabulary errors.
Added 150+ Exam Practic[...]
This handbook is the perfect starting place for anyone who wants to jump into the world of penetration testing but doesn't know where to start. This book covers every phase of the hacker methodology and what tools to use in each phase. The tools in this book are all open source or already present on[...]
Your new business went online yesterday and you've got a marketing budget of zero. How are you supposed to create a movement around your product? How can you get to your first thousand - or million - customers? Starting from zero, it feels impossible. Enter the growth hacker. You may not have heard [...]
An engrossing, fascinating report from inside Anonymous, by the scholar who was embedded in the international movement[...]
Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of Anonymous' deepest, darkest secrets." Half a dozen years ago, anthropologist Gabriella Coleman set out to study t[...]
Stalking is a predatory form of terrorizing people. Whether the tormenting erotomanic pursuit by the unrequited lover of his or her prey, or the secretive invasive surveillance in government-backed counterterrorism, stalker and stalkee are "coupled" in today's world of idealized yet dissociated intr[...]