Angebote zu "James" (20 Treffer)

Kategorien

Shops

Tor and the Dark Art of Anonymity: How to Be In...
9,95 € *
ggf. zzgl. Versand

The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that'll make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive...and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll grow a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor and the Dark Art of Anonymity: Browse the Internet Anonymously Darkcoins, Darknet Marketplaces, and Opsec Requirements Tor Hidden Servers How to Not Get Caught Counterforensics the FBI Doesn't Want You to Know About Windows vs. Linux - Which Offers Stronger Network Security? Cryptocurrency (Real Bitcoin Anonymity) Supercookies and Encryption Preventing Marketers and Debt Collectors from Finding You How to Protect Your Assets How to Hide Anything 1. Language: English. Narrator: James C. Lewis. Audio sample: http://samples.audible.de/bk/acx0/044355/bk_acx0_044355_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 04.12.2020
Zum Angebot
Tor Darknet Bundle (5 in 1) Master the Art of I...
9,95 € *
ggf. zzgl. Versand

FIVE books that will change your life!  The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity. Just a few more benefits this audiobook bundle will provide Step-by-step guides for Tor, Freenet, I2P, VPNs, Usenet, and more browser fingerprinting How to avoid it antI-hacking and counter-forensics techniques  How to encrypt files (I make this super simple)  How to defeat NSA spying  How and where to browse the deep web (Tor Onion Sites, Freenet sites)  How to protect your identity  How to hide anything from ANYONE  Bitcoins, Darknet Marketplaces and the Opsec Requirements You Need Tor Hidden Servers How to not get caught  Counter-forensics the FBI doesn't want you to know about  Windows vs. Linux Network Security  Cryptocurrency (real bitcoin anonymity)  Supercookies Preventing marketers and debt collectors from finding you  How to protect your assets Home, money & family  Get this audiobook today and watch your life change for the better! 1. Language: English. Narrator: James C. Lewis. Audio sample: http://samples.audible.de/bk/acx0/117758/bk_acx0_117758_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 04.12.2020
Zum Angebot
Tor and the Deep Web: Bitcoin, DarkNet & Crypto...
9,95 € *
ggf. zzgl. Versand

The ultimate Tor/Darknet guide for 2017-2018 just got better! Just three questions you need to ask yourself:  Do you value privacy? Do you value freedom? Do you want to be anonymous? If you answered yes to any of the above, this is your audiobook. Instant anonymity, right now, can be yours for the taking. As science fiction author Hugh Howey once stated: When pursuing a dream, don't wait.  People sling words across the Internet without regard for their future. They don't know it but they are digging their own graves by attacking Goliath without a shield. Every word you say on forums, Usenet, Facebook, and news outlets is out there forever whether you are Republican, Democrat, Libertarian, Green Party, or bachelor party. Doesn't matter which one. One day you may wake up to discover a state power wants a "type" of voter out of the equation altogether: You.  How do you erase every critical forum comment you ever made? How do you scrub your Facebook page? How do you make anonymous online comments so that your new employer doesn't fire you? Enter Tor. This is the ultimate guide with easy take-you-by-the-hand instructions to teach you not only Tor, but VPNs, Bitcoins, hacking, Darknet personas and even how to evade the Sauronic eye that is the NSA. Yes. This book kills NSA spying dead.  Comment anonymously on any website Tor browser, Freenet, I2P, and all alternatives Cryptocurrency - how to buysell anonymously Encryption guide: PGP. Veracrypt. Email. Linux. Windows. Macs. Kali. Android. Phones. Online privacy no matter where you are Hacking for beginners on the Darknet  Edward Snowden's biggest mistake Master the art of invisibility today!   1. Language: English. Narrator: James C. Lewis. Audio sample: http://samples.audible.de/bk/acx0/101335/bk_acx0_101335_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 04.12.2020
Zum Angebot
NCR Voyager
34,00 € *
ggf. zzgl. Versand

High Quality Content by WIKIPEDIA articles! The NCR Voyager was an SMP computer platform produced by the NCR Corporation. It is MCA-based with NUMA. 486 and Pentium based. The Voyager architecture, or V'ger, reached its zenith with a 16-way SMP that scaled to the equivalent of about 6 CPUs. The Voyager architecture used a high overhead directory based cache cohererency scheme. There were several excellent aspects of the architecture, including power fail recovery, a large number of IO slots, up to 56 internal disk drives, and an excellent power subsystem. Worldwide there are four Voyager systems running Linux, James Bottomley, the Linux SCSI and NCR VOYAGER maintainer, has two of them.

Anbieter: Dodax
Stand: 04.12.2020
Zum Angebot
Intel Threading Building Blocks
54,90 CHF *
ggf. zzgl. Versand

Multi-core chips from Intel and AMD offer a dramatic boost in speed and responsiveness, and plenty of opportunities for multiprocessing on ordinary desktop computers. But they also present a challenge: More than ever, multithreading is a requirement for good performance. This guide explains how to maximize the benefits of these processors through a portable C++ library that works on Windows, Linux, Macintosh, and Unix systems. With it, you'll learn how to use Intel Threading Building Blocks (TBB) effectively for parallel programming -- without having to be a threading expert. Written by James Reinders, Chief Evangelist of Intel Software Products, and based on the experience of Intel's developers and customers, this book explains the key tasks in multithreading and how to accomplish them with TBB in a portable and robust manner. With plenty of examples and full reference material, the book lays out common patterns of uses, reveals the gotchas in TBB, and gives important guidelines for choosing among alternatives in order to get the best performance. You'll learn how Intel Threading Building Blocks: * Enables you to specify tasks instead of threads for better portability, easier programming, more understandable source code, and better performance and scalability in general * Focuses on the goal of parallelizing computationally intensive work to deliver high-level solutions * Is compatible with other threading packages, and doesn't force you to pick one package for your entire program * Emphasizes scalable, data-parallel programming, which allows program performance to increase as you add processors * Relies on generic programming, which enables you to write the best possible algorithms with the fewest constraints Any C++ programmer who wants to write an application to run on a multi-core system will benefit from this book. TBB is also very approachable for a C programmer or a C++ programmer without much experience with templates. Best of all, you don't need experience with parallel programming or multi-core processors to use this book.

Anbieter: Orell Fuessli CH
Stand: 04.12.2020
Zum Angebot
Platform Ecosystems
55,90 CHF *
ggf. zzgl. Versand

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

Anbieter: Orell Fuessli CH
Stand: 04.12.2020
Zum Angebot
Hacking com Kali Linux
18,00 CHF *
ggf. zzgl. Versand

Hacking com Kali Linux apresenta a distribuição mais recente da ferramenta que é o padrão de fato para testes de invasão Linux. Começando pelo uso do live CD do Kali Linux e prosseguindo para a instalação em discos rígidos, pen drives e cartões SD, os autores James Broad e Andrew Bindner conduzem você no processo de criação de uma versão personalizada da distribuição live do Kali Linux. Você aprenderá a configurar os componentes de rede, os dispositivos de armazenamento e os serviços de sistema como o DHCP e os web services. Após ter se familiarizado com os componentes básicos do software, você aprenderá a usar o Kali Linux durante as fases do ciclo de vida do teste de invasão; uma ferramenta principal para cada fase será explicada. Este livro trará benefícios aos profissionais de todos os níveis da área de segurança de informações, aos hackers, aos administradores de sistemas, aos administradores de rede, aos pentesters profissionais, sejam iniciantes ou de nível intermediário, assim como aos estudantes em busca de uma formação acadêmica na área de segurança de informações. - Explicações detalhadas sobre o ciclo de vida completo dos testes de invasão - Visão geral completa das informações sobre o Kali Linux, seus recursos e os downloads da distribuição - Exercícios práticos para reforçar os tópicos abordados

Anbieter: Orell Fuessli CH
Stand: 04.12.2020
Zum Angebot
Platform Ecosystems
41,99 € *
ggf. zzgl. Versand

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

Anbieter: Thalia AT
Stand: 04.12.2020
Zum Angebot
Intel Threading Building Blocks
39,99 € *
ggf. zzgl. Versand

Multi-core chips from Intel and AMD offer a dramatic boost in speed and responsiveness, and plenty of opportunities for multiprocessing on ordinary desktop computers. But they also present a challenge: More than ever, multithreading is a requirement for good performance. This guide explains how to maximize the benefits of these processors through a portable C++ library that works on Windows, Linux, Macintosh, and Unix systems. With it, you'll learn how to use Intel Threading Building Blocks (TBB) effectively for parallel programming -- without having to be a threading expert. Written by James Reinders, Chief Evangelist of Intel Software Products, and based on the experience of Intel's developers and customers, this book explains the key tasks in multithreading and how to accomplish them with TBB in a portable and robust manner. With plenty of examples and full reference material, the book lays out common patterns of uses, reveals the gotchas in TBB, and gives important guidelines for choosing among alternatives in order to get the best performance. You'll learn how Intel Threading Building Blocks: * Enables you to specify tasks instead of threads for better portability, easier programming, more understandable source code, and better performance and scalability in general * Focuses on the goal of parallelizing computationally intensive work to deliver high-level solutions * Is compatible with other threading packages, and doesn't force you to pick one package for your entire program * Emphasizes scalable, data-parallel programming, which allows program performance to increase as you add processors * Relies on generic programming, which enables you to write the best possible algorithms with the fewest constraints Any C++ programmer who wants to write an application to run on a multi-core system will benefit from this book. TBB is also very approachable for a C programmer or a C++ programmer without much experience with templates. Best of all, you don't need experience with parallel programming or multi-core processors to use this book.

Anbieter: Thalia AT
Stand: 04.12.2020
Zum Angebot