• Welcome!
Total books

Computer & Internet

Administration
289
AI and Robotics
165
Algorithms
19
Cloud
375

Communicaion and Telecommunication
129
Databases
716
Enterprise
145
Graphics & Design
289

Hardware
335
Information Technology
311
Mobile Computing
542
Network Security
69

Operating System
300
Programming
2655
Security
136
Software Engineering
207

Web Design & Development
442
Web Development
1358
Sort by
One Two Three . . . Infinity: Facts and Speculations of Science

". . . full of intellectual treats and tricks, of whimsy and deep scientific philosophy. It is highbrow entertainment at its best, a teasing challenge to all who aspire to think about the universe." — New York Herald Tribune

Hacking Gmail
Hacking Gmail Sented by Luis

The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings,

WEB HACKING 101
WEB HACKING 101 Sented by Daniel

Have you always been interested and fascinated by the world of hacking? Do you wish to learn more about networking?

The Hacker Playbook 3  Practical Guide To Penetration Testing

Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory.

The Hacker Playbook 2  Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Penetration testing a Hands-on introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

Hacking_ Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing

Ethical hackers are in high demand. As we become more and more reliant on computer technology, black-hat hackers are working to profit from exploiting those technologies to steal personal information, cause networks to fail, and gain access to sensitive data. To combat the constant attacks on their networks and web pages, businesses and government agencies rely on white-hat hackers.

How to Hack Computers_ how to hack computers, hacking for beginners, penetration testing, hacking for dummies, computer security, computer hacking, hacking techniques, network scanning

Hackers are shrouded in a cloud of mystery, and most people don't understand who they are, what they do, how they do it, and what motivates them. As a network security engineer, I want to reveal the mysterious world of hackers to beginners so you can get your feet wet hacking. Not only will I teach you the background of hacking, but I will also expose you to some of the latest software and even show you step-by-step how to install it and use it in the demonstrations contained within this guide.

Sort by