Operativsystem
Filter
Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the …
The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface the interface employed by nearly every application that runs on a Linux …
This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You'll …
In 2004, Android was two people who wanted to build camera software but couldn't get investors interested. Today, Android is a large team at Google, delivering an operating system …
A hands-on introduction to ethical hacking for a younger audience from the author of 'Teach Your Kids to Code.'
Device drivers make it possible for your software to communicate with your hardware, and because every operating system has specific requirements, driver writing is nontrivial. …
If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, this book is an excellent first step. Using Kali Linux - an advanced penetration …
Unlike some operating systems, Linux doesn t try to hide the important bits from you it gives you full control of your computer. But to truly master Linux, you need to understand …
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to …
This comprehensive guide to Android malware introduces current threats facing the world's most widely used operating system. After exploring the history of attacks seen in the wild …