Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modern Cryptography: Protect Your Data with Fast Block Ciphers
Modern Cryptography: Protect Your Data with Fast Block Ciphers
This book gives a general picture of modern cryptography. At the same time, it covers specific issues related to developing fast block ciphers using software and/or hardware implementation in a way that is easily understandable to a wide circle of readers. The material dedicated to the meaning of cryptography in informational society, two-key...
Advanced 3ds max 5 Modeling & Animating
Advanced 3ds max 5 Modeling & Animating
In this comprehensive game development reference, users are taken from modeling a still-life scene to animating photo-realistic and fantasy characters in a variety of organic and mechanical backgrounds.

This book focuses on practical work with the 3ds max modeling and animation package from Discreet and is a follow-up to the book
...
PC Hardware Tuning & Acceleration
PC Hardware Tuning & Acceleration
From choosing overclocking tools and setting the optimal mode to allowing the fulfillment of the potential of a PC's components, this reference discusses solutions to the problem of computers not performing well enough to accommodate requested tasks.

Sooner or later, every computer user runs into the problem of the computer not being able...

Windows .NET Server 2003 Registry
Windows .NET Server 2003 Registry

Provides a historical overview of the Registry and outlines the differences between Windows 9x/ME and Windows NT/2000/XP/.NET Registries.


Enabling system, network, and security administrators to master Registry concepts and architecture, this book provides a historical overview of the Registry and outlines the differences...

Windows .NET Server 2003 Domains & Active Directory
Windows .NET Server 2003 Domains & Active Directory
This reference covers all main system tools and program methods used for routine Active Directory administration and troubleshooting.

Intended for system administrators with a general knowledge of Windows 2000 or Windows XP/.NET, this reference covers all main system tools and program methods used for routine Active Directory...

Disassembling Code : IDA Pro and SoftICE
Disassembling Code : IDA Pro and SoftICE
Emphasizing the analysis of software code and identifying the main structure of languages in which they were written, this real-world text covers various aspects of disassembling, analyzing, and debugging software code.

This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in...

Hacker Disassembling Uncovered
Hacker Disassembling Uncovered
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

This book is dedicated to the basics of hacking—methods of analyzing programs using a...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
The Assembly Programming Master Book
The Assembly Programming Master Book

Aiming to prove that writing programs for Windows in the Assembly language is no more difficult than writing the same programs using C/C++, this guide shows how Assembly code is actually more compact and executes faster. The algorithmic knowledge and skills lost in high-level programming provides the justification demonstrated in this guide for...

Hacker Web Exploitation Uncovered
Hacker Web Exploitation Uncovered

Written from both from the attacker's and security specialist's perspective, this thorough guide uncovers how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.

A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is...

Visual C++ Optimization with Assembly Code
Visual C++ Optimization with Assembly Code

Describing how the Assembly language can be used to develop highly effective C++ applications, this guide covers the development of 32-bit applications for Windows. Areas of focus include optimizing high-level logical structures, creating effective mathematical algorithms, and working with strings and arrays. Code optimization is considered for...

unlimited object storage image
Result Page: 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy