Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

SQL for Microsoft Access, Second Edition (Wordware Applications Library)
SQL for Microsoft Access, Second Edition (Wordware Applications Library)
SQL for Microsoft Access, Second Edition provides a guide to getting the most out of Microsoft Access through the use of Structured Query Language. Step-by-step examples demonstrate how to use SQL script to create tables, add records to tables, and retrieve and manage records. Readers will also learn about calculated fields, Access projects, and...
Programming and Problem Solving with Visual Basic .NET
Programming and Problem Solving with Visual Basic .NET

Programming and Problem Solving with Visual Basic .NET introduces Visual Basic from an object-oriented viewpoint, with a rigor and accessibility perfect for students learning their first programming language. Rich in the pedagogical style that is the trademark of the Dale series of programming texts, this Visual Basic text provides...

C++ Plus Data Structures, Third Edition
C++ Plus Data Structures, Third Edition
C++ Plus Data Structures is designed for a course in Data Structures where C++ is the programming language. The book focuses on abstract data types as viewed from three different perspectives: their specification, their application, and their...
Introduction to 80X86 Assembly Language and Computer Architecture
Introduction to 80X86 Assembly Language and Computer Architecture
A computer can be viewed from many different levels, and used for many different functions, such as the creation of new application software. However, an actual computer works at an even lower level than this. Introduction to 80x86 Assembly Language and Computer Architecture divides its emphasis between the assembly-language/machine-language level...
VB.NET: A Laboratory Course
VB.NET: A Laboratory Course
VB.NET: A Laboratory Course teaches the reader how to program in Visual Basic from an object-oriented viewpoint, which is important becuase of the object-oriented flavor of VB.NET. The emphasis of this book is not on the fancy users interface tricks you can perform with VB.NET, but on the fundamentals of writing correct and efficient VB programs....
Data Structures in Java: A Laboratory Course
Data Structures in Java: A Laboratory Course
Data Structures in Java: A Laboratory Course defines active learning. With sixteen labs to choose from, this laboratory manual creates a "learn by doing" experience for its students by engaging them in implementation of data structures and in application of algorithms. Students are challenged to exercise their knowledge in each of the...
User-Centered Web Development
User-Centered Web Development
When a technology such as the Web is first introduced, the primary concern is making sure that the technology works. As we become more experienced with designing web sites, the problem no longer remains the technical infrastructure but rather becomes how we can make a web site that is easy to use and meets the needs of the user. As a result, many...
Programming and Problem Solving with Java
Programming and Problem Solving with Java

Programming and Problem Solving with Java™ is an excellent resource for discovering Java as a first programming language. After introducing the very basics of programming, the text provides detail on Java syntax, semantics, classes and objects, and then continues with coverage of arithmetic expressions, selection and encapsulation, file...

Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of...
Object-Oriented Data Structures In Java
Object-Oriented Data Structures In Java
This book teaches the classic data structures with an informal, yet rigorous, approach; it includes the appropriate object-oriented concepts and makes use of the appropriate Java constructs.

Welcome to the first edition of Object-Oriented Data Structures using Java. This book has been written to present the algorithmic, programming,
...
Analysis of Algorithms : An Active Learning Approach
Analysis of Algorithms : An Active Learning Approach
The goal of Analysis of Algorithms is to raise awareness of the effect that algorithms have on the efficiency of a program and to develop the necessary skills to analyze general algorithms used in programs. The text presents the material with the expectation that it can be used with active and cooperative learning methodology, based on the premise...
Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy