🦃 Cozy up with autumn reads! Let our AI Librarian pick your perfect fireside book 🍁
Explore the literary world of this author
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, languag...
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one e...
A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is ...
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according...
Volume [1]-
...
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Appl...
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is ...
How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attemp...
"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetrat...
Own it...Just Like Windows or Linux!
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, ...
Grundtechniken, erweterte Operatoren. Underground Googling. Wie man sich vor Google-Hackern schützt
"This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the...
The authors discuss the "Google way" to instant message friends and make calls from a computer to any phone in the world by using Google Talk, Google'...
Hacking and Penetration Testing Ultimate CD contains six of our best-selling titles. This collection of ebooks provides the IT security professional w...
How to Own an Identity
The Complete Series Collector's Edition