eBooks-it.org Logo
eBooks-IT.org Inner Image

Packt eBooks Page 206

Download free Packt eBooks Page 206

Arch Linux Environment set-up How-To

Arch Linux Environment set-up How-To Image
Get started with Arch Linux as a blank canvas and build the simple and elegant environment you want Overview Install and configure Arch Linux to set up your optimum environment for building applications Boot and manage services, add and remove packages Discover and get to grips with the features of the Linux Kernel In Detail Over the years there have been many Linux distributions out there, some are trying to do everything for you, others don't. Arch Linux tries to be easy and user-friendly for developers and enthusiasts who are willing to customize their system to the maximum. "Arch Linux Environment Setup How-to" will give you the step-up into the Arch Linux world. It will guide you through the different ways of installation and how to ...

BackTrack Testing Wireless Network Security

BackTrack Testing Wireless Network Security Image
Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide Overview Make your wireless networks bulletproof Easily secure your network from intruders See how the hackers do it and learn how to defend yourself In Detail Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In the majority of cases, the default settings for your networks are not enough to protect you. With your data being transferred over the air, it can be easily plucked and used by anyone who knows how. Don't let it happen to you. BackTrack - Testing Wireless Network Security will help you secure your wireless networks and keep your personal data safe. W...

Raspberry Pi for Secret Agents

Raspberry Pi for Secret Agents Image
Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects! Overview Detect an intruder on camera and set off an alarm Listen in or record conversations from a distance Find out what the other computers on your network are up to Unleash your Raspberry Pi on the world In Detail Ever wished you could play around with all the neat gadgets your favorite spies use (like James Bond or Michael Westen)? With the introduction of the remarkable Raspberry Pi and a few USB accessories, anybody can now join in on the action. Discover how to turn your Raspberry Pi into a multipurpose secret agent tool! Through a series of fun, easy-to-follow projects youll learn how to set up audio/video surveillance, explore your Wi-Fi net...

Python Geospatial Development

Python Geospatial Development Image
This is a tutorial style book that will teach usage of Python tools for GIS using simple practical examples and then show you how to build a complete mapping application from scratch. The book assumes basic knowledge of Python. No knowledge of Open Source GIS is required. This book is useful for Python developers who want to get up to speed with Open Source GIS in order to build GIS applications or integrate Geo-Spatial features into their applications....

Instant Metasploit Starter

Instant Metasploit Starter Image
The art of ethical hacking made easy with Metasploit Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results Rapidly develop and execute exploit codes against a remote target machine Focus less on theory and more on results, with clear, step-by-step instructions on how to master ethical hacking, previews, and examples to help you secure your world from hackers Structured in such a way that you will grasp the concepts of Metasploit framework very quickly even if you dont have any prior experience in the topic In Detail The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and ...



2007 - 2017 © eBooks-IT.org