eBooks-it.org Logo
eBooks-IT.org Inner Image

Hacks eBooks

Download free Hacks eBooks

The Basics of Hacking and Penetration Testing

Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing Image
2nd Edition
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanatio...

Hacking GMail

Hacking GMail Image
The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fansThis is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accountsCovers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacksShows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog...

Understanding Network Hacks

Attack and Defense with Python
Understanding Network Hacks Image
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code....

Word Hacks

Tips & Tools for Taming Your Text
Word Hacks Image
As one of the applications in Microsoft Office, Word is the dominant word-processing program for both Windows and Mac users. Millions of people around the globe use it. But many, if not most, of them barely skim the surface of what is possible with Microsoft Word. Seduced by the application's supposed simplicity, they settle for just what's obvious--even if it doesn't satisfy their wants and needs. They may curse the wretched Bullets and Numbering buttons multiple times a day or take hours to change the font size of every heading in a lengthy report, yet they're reluctant to dig deeper to take advantage of Word's immense capabilities and limitless customization tools.Let Word Hacks be your shovel. Let it carve your way into Word and make this most po...

Hacking Firefox

More Than 150 Hacks, Mods and Customizations
Hacking Firefox Image
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.Step-by-step instructions for these hacks and dozens moreSettings, content, and extension hacksHacking the interface and themesPerformance boostersAnti-phishing and security hacksToolbar and status bar tweaksNavigation, download, and search hacksHacks for common pluginsExtensio...


2007 - 2017 © eBooks-IT.org