It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides..
For less than $200, Kinect can see and hear its surroundings, find people, even tell them apart. It's a huge step towards controlling computers and devices just like Tom Cruise did in Minority Report. Hackers worldwide are salivating at the chance to t..
What was once previously considered a purely theoretical attack technique is now within reach of the reader. This book will demonstrate the techniques of web browser hacking: Attacking the Browser Attacking the Web (via the browser) Attacking the Intr..
According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed ..
It’s way easier than you ever imagined! John Baichtal has helped thousands of people get started with robotics. He knows what beginners need to know. He knows your questions. He knows where you might need extra help. Now, he’s brought toget..
Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to lau..