Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Visual C++ Optimization with Assembly Code
Visual C++ Optimization with Assembly Code

Describing how the Assembly language can be used to develop highly effective C++ applications, this guide covers the development of 32-bit applications for Windows. Areas of focus include optimizing high-level logical structures, creating effective mathematical algorithms, and working with strings and arrays. Code optimization is considered for...

Hacker Web Exploitation Uncovered
Hacker Web Exploitation Uncovered

Written from both from the attacker's and security specialist's perspective, this thorough guide uncovers how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.

A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is...

The Assembly Programming Master Book
The Assembly Programming Master Book

Aiming to prove that writing programs for Windows in the Assembly language is no more difficult than writing the same programs using C/C++, this guide shows how Assembly code is actually more compact and executes faster. The algorithmic knowledge and skills lost in high-level programming provides the justification demonstrated in this guide for...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Hacker Disassembling Uncovered
Hacker Disassembling Uncovered
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

This book is dedicated to the basics of hacking—methods of analyzing programs using a...

Disassembling Code : IDA Pro and SoftICE
Disassembling Code : IDA Pro and SoftICE
Emphasizing the analysis of software code and identifying the main structure of languages in which they were written, this real-world text covers various aspects of disassembling, analyzing, and debugging software code.

This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in...

Windows .NET Server 2003 Domains & Active Directory
Windows .NET Server 2003 Domains & Active Directory
This reference covers all main system tools and program methods used for routine Active Directory administration and troubleshooting.

Intended for system administrators with a general knowledge of Windows 2000 or Windows XP/.NET, this reference covers all main system tools and program methods used for routine Active Directory...

Windows .NET Server 2003 Registry
Windows .NET Server 2003 Registry

Provides a historical overview of the Registry and outlines the differences between Windows 9x/ME and Windows NT/2000/XP/.NET Registries.


Enabling system, network, and security administrators to master Registry concepts and architecture, this book provides a historical overview of the Registry and outlines the differences...

PC Hardware Tuning & Acceleration
PC Hardware Tuning & Acceleration
From choosing overclocking tools and setting the optimal mode to allowing the fulfillment of the potential of a PC's components, this reference discusses solutions to the problem of computers not performing well enough to accommodate requested tasks.

Sooner or later, every computer user runs into the problem of the computer not being able...

Advanced 3ds max 5 Modeling & Animating
Advanced 3ds max 5 Modeling & Animating
In this comprehensive game development reference, users are taken from modeling a still-life scene to animating photo-realistic and fantasy characters in a variety of organic and mechanical backgrounds.

This book focuses on practical work with the 3ds max modeling and animation package from Discreet and is a follow-up to the book
...
Result Page: 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy