Catalog Search Results
Author
Series
Language
English
Description
Spring Boot 2.4 is what everyone turns to build top-of-the line systems… ...when it comes to Java application development. Learn the latest features that can make your apps rock solid including: Web and Data accessDeveloper tools and test supportOperational featuresDocker container bakingGraalVM production supportMessagingSecurityMore! Written cover-to-cover using Java's de facto toolkit, Spring, your apps will perform like never before. Grab your...
Author
Language
English
Description
After her family narrowly escaped a kidnapping, Isabel is not taking any chances on their safety. While the others try to get back to normal, Isabel makes it her mission to track down Dr. Rodriguez so she can finally feel safe again. Nothing feels stable anymore as Aunt Claire is being questioned by the government on her research processes and Maya is considering colleges around the country. During a trip to Washington D.C., they find themselves in...
Author
Language
English
Description
I must confess.I did something very naughty…And I haven't learned my lesson.I was late on tuition…In a mountain of debt…And morally obligated to grant my mother's dying wish to get my college degree.Which is why I was on the seedy-underbelly of the internet, cruising for a hacking job.I had no idea Hunter Davies, the elusive tech giant, was watching me, and when I passed his little impromptu pop-quiz, he sent armed men to bring me to his estate.And...
Author
Series
Language
English
Description
Fourteen-year-old Jason can't say no when Emma from school asks for his help to stop a logging company. But Jason's behaviour takes a turn for the worse after he receives some bad news, and he gets into a serious clash with the loggers. Curiously, the loggers don't react as expected.Things get even stranger when weird computer glitches suggest the loggers are up to something. Using his computer smarts, Jason starts to investigate but it isn't long...
5) Web hacking: apprenez à tester la sécurité des applications web comme un hacker pro avec kali linux
Author
Language
Français
Description
Question : est-ce que ça vous intéresse d'apprendre le hacking des applications web, recevoir une formation vidéo et faire partie d'un groupe de hackers en investissant le minimum de temps et d'argent ?Alors lisez ce qui suit :Quand j'ai commencé avec tout ces trucs de hacking (il y a des années de cela.), entendre le mot «injection SQL» suffisait pour me dégoûter de tout ce qui en rapport avec le Web, ça me paraissait trop compliqué de...
6) Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing
Author
Language
English
Description
"Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing" is a comprehensive guide that provides an in-depth exploration of the latest techniques and tools used by cybersecurity professionals to protect networks and systems from cyber threats. With the rise of cybercrime, protecting digital assets has become a critical concern for individuals and organizations alike. This book provides a practical and accessible...
Author
Language
English
Description
Unveil the secrets of influence with "The Persuasion Playbook - Hacking Your Communications," a revolutionary guide that redefines the art of persuasion. In this compelling book, embark on a transformative journey through the depths of human psychology and communication tactics, uncovering a wealth of strategies that will revolutionize the way you navigate your personal and professional life.This book is your key to mastering the intricate dynamics...
Author
Language
English
Description
Spring Boot 2.3 is the hottest ticket in town......when it comes to Java development. Learn the latest features that can scale your apps including:* Web and Data access* Developer tools and test support* Operational features* Docker container baking* Bottleneck discovery with BlockHound* Messaging* Security* More!Written cover-to-cover using Project Reactor, your apps will scale like never before.Grab your copy today and learn to build top-notch,...
Author
Language
English
Description
"Hacking and Cybersecurity: Building Resilient Digital Defenses" is a comprehensive guide to understanding the fundamentals of cybersecurity and the principles of hacking, and building resilient digital defenses to protect against cyberattacks. In today's interconnected world, cyberattacks are becoming increasingly frequent and sophisticated, posing a threat to individuals, organizations, and governments. This book provides a detailed overview of...
Author
Language
English
Description
I've lived under the tremendous pressure of credit card debt, and it wasn't fun. Today, I have no credit card debt and thousands of dollars in my saving and investing accounts. However, this money did not just appear in my account, nor did I work more hours. I used the little-known technique of house hacking. House hacking turns your primary residence into an income-producing asset. You can use this new cash flow to pay down debt and eventually save...
Author
Language
English
Description
Crochet new life into unloved, unworn clothes with sustainable fashion hacks!
This book is not just a collection of crochet patterns or a selection of makes to keep you looking de rigeur. Oh no-this book is actually a toolkit of hints, tips and instructions to help you rethink the clothes that are already around you, from your own wardrobe to second-hand stores and thrifted finds. This book is a way of life.
Whether it's repairing tears and holes,...
Author
Language
English
Description
"How to Do Growth Hacking - A Practical Guide" is more than a book; it's a growth companion. Whether you're just starting your growth hacking journey or looking to refine your existing strategies, this book offers the practical knowledge, ethical guidance, and innovative insights you need to thrive in today's business environment. It's not just about growing fast; it's about growing smart, sustainably, and ethically. Make this guide your trusted partner...
Author
Language
English
Description
Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis" is a comprehensive guide to understanding the vulnerabilities and defenses of network protocols. In today's interconnected world, networks are essential for communication and collaboration, making them a prime target for hackers seeking to exploit vulnerabilities in the protocols that underpin them. This book provides a detailed overview of network protocols, including...
Author
Language
English
Description
Following the bank bailout and the Global Financial Crisis, anger towards the financial system reached new heights. Yet the practical workings of the system remain opaque to many people, this practical guide to the financial sector will bridge the gap between protest slogans and practical proposals for reform.
Activist and former derivatives broker Brett Scott proposes a framework for understanding financial institutions, based on the three principles...
Author
Language
English
Description
African-American computer security expert, Alayna Alexander, will do anything to have a family, including marry a man she doesn't love.But confusion in the form of tall, dark Khavon Brighton, a former computer hacker, slips into Alayna's life when she is assigned to work with him on a top-level security project. Sparks fly as the two race to thwart a desperate cyberthief who has a personal vendetta against Khavon. "I read your book, Cappuccino in...
16) Hacking pour débutant: le guide complet pour débuter en cybersécurité avec Kali Linux et maîtris
Author
Language
Français
Description
La plupart des gens pensent que le hacking est quelque chose de magique, ou que les hackers sont nés avec ce talent de pouvoir pénétrer dans les ordinateurs et les réseaux. Ce n'est pas vrai.Laissez-moi vous dire quelque chose, avoir la capacité de pirater est l'une des compétences les plus recherchées de ce siècle, en particulier après la pandémie o tout semble se faire en ligne. Ainsi, les organisations ont besoin de plus de hackers éthiques...
17) Le guide du hacker: le guide simplifié du débutant pour apprendre les bases du hacking avec Kali Lin
Author
Language
Français
Description
Attention: à ceux qui veulent apprendre le hacking et rejoindre une communauté de hackers, lisez ce qui suit... Imaginez que vous soyez capable de pénétrer n'importe quel ordinateur.
Imaginez avoir ce super pouvoir de cracker des mots de passe et détruire des réseaux entiers avec seulement un PC et... votre cerveau!Mais le chemin n'est pas aussi évident qu'il y paraît, peut-être ne trouvez-vous pas les ressources pour apprendre le vrai hacking,...
Author
Language
English
Description
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive...
Author
Series
Language
English
Description
Mind Hacking - 3 Manuscripts in 1 Book, Including: How to Rewire Your Brain, How to Think Differently and How to Learn Faster.
1)
HOW TO REWIRE YOUR BRAIN:
7 Steps to Master Neuroplasticity, Mind Hacking, Think Habits & Practical Neuroscience.
YOU WILL LEARN:
· What neuroplasticity entails.
· How to practice your subconscious mind power.
· How to alter your conscious mind.
· How to change your outlook with mind hacking.
·...
20) Hacking With Kali Linux: A Step by Step Guide to Learn the Basics of Linux Penetration. What a Begin
Author
Language
English
Description
Do you want to find out how hackers move around the net?Do you want to become an ethical or unethical hacker? What is your purpose? Modern-day hacking has become more sophisticated than ever. Hacktivists groups, ransomware, and highly classified document releases are a daily problem. In modern times, the ethical hackers are needed more than ever to protect and prevent hack attacks. The information available to everyone makes it all the easier for...
In Interlibrary Loan
Didn't find what you need? Items not owned by Salina Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request