Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Mastering Sublime Text
Mastering Sublime Text

When it comes to cross-platform text and source code editing, Sublime Text has few rivals. This book will teach you all its great features and help you develop and publish plugins. A brilliantly inclusive guide.

Overview

  • Discover efficient, keyboard-driven text editing
  • Recognize the latest...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
"In recent years, comprehensive texts have been written for several of the other major areas of Artificial Intelligence, including machine learning, natural-language processing, and constraint-satisfaction processing, but until now, the field of planning has been devoid of such a resource, despite the considerable number of advances in and the...
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
International Labour Organization and Global Social Governance
International Labour Organization and Global Social Governance
This open access book explores the role of the ILO (International Labour Organization) in building global social governance from multiple and mutually complementary perspectives. It explores the impact of this UN´s oldest agency, founded in 1919, on the transforming world of work in a global setting, providing insights...
The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Home Recording Studio  Build it Like the Pros
Home Recording Studio Build it Like the Pros
With the advances in digital technology, musicians can now produce their own music. But the gear is only part of the equation when it comes to recording and mixing. The next part is finding a soundproof room that you can produce it in. Unfortunately, any old room in your house will not suffice for a quality recording. Without a decent room, you'l...
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has

Not everything that you might think is unfair in the workplace is actually illegal.

In order to fully protect your rights, you must understand them first. The Employee Answer Book, the latest addition to the Answer Book Series, answers real questions from real people. This book discusses federal employment law in detail and touches...

Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy