 |
|
|
|
 Rootkits: Subverting the Windows KernelRootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James... |  |  Modern C++ Design: Generic Programming and Design Patterns AppliedModern C++ Design is an important book. Fundamentally, it demonstrates 'generic patterns' or 'pattern templates' as a powerful new way of creating extensible designs in C++--a new way to combine templates and patterns that you may never have dreamt was possible, but is. If your work involves... |  |  Firewalls and Internet Security: Repelling the Wily Hacker, Second EditionFirewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the... |
|
|
|
|
|
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 |