Rootkits: Subverting the Windows Kernel
Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...
THE Java(TM) Programming Language, Fourth Edition
Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike.
Developers around the...
C++ Network Programming, Vol. 1: Mastering Complexity with ACE and Patterns
As networks, devices, and systems continue to evolve, software engineers face the unique challenge of creating reliable distributed applications within frequently changing environments. C++ Network Programming, Volume 1, provides practical solutions for developing and optimizing complex distributed systems using the...
|Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 |