Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Linux Cookbook, Second Edition
The Linux Cookbook, Second Edition
The Linux Cookbook, 2nd Edition is your guide to getting the most out of Linux. Organized by general task (such as working with text, managing files, and manipulating graphics), each section contains a series of step-by-step recipes that help you to get your work done quickly and efficiently, most often from the command line. Nearly 50...
Hacking the Xbox: An Introduction to Reverse Engineering
Hacking the Xbox: An Introduction to Reverse Engineering
This--this being the attitude encapsulated in Andrew "bunnie" Huang's Hacking the Xbox--is why a lot of people got into the computer industry in the first place. These people liked taking things apart and figuring out how they worked, then making them serve purposes they weren't originally designed for and sharing the new discoveries with...
The Book of JavaScript: A Practical Guide to Interactive Web Pages
The Book of JavaScript: A Practical Guide to Interactive Web Pages
Most Web developers pick up a book to learn how to use a language like JavaScript, looking for practical examples of how to get things done. The Book of JavaScript: A Practical Guide to Interactive Web Pages is plenty practical, and hits the mark as a reader-friendly and well-organized tutorial on JavaScript.

The book...

Steal This File Sharing Book
Steal This File Sharing Book

Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song...

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into...
Growing Software: Proven Strategies for Managing Software Engineers
Growing Software: Proven Strategies for Managing Software Engineers

As the technology leader at a small software company, you need to focus on people, products, processes, and technology as you bring your software to market, while doing your best to put out fires and minimize headaches.

Growing Software is your guide to juggling the day-to-day challenges of running a software company while...

Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software

The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer network, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable business system for a small business...

The Official GNOME 2 Developer's Guide
The Official GNOME 2 Developer's Guide
Developers who write programs for GNOME use the GNOME API. Working with the GNOME API is preferable because the program will conform to the standard GNOME program look and feel. It also allows the developer to use the GNOME specific libraries in the program, greatly simplifying the development process. GNOME 2.0 is the official GNOME Foundation...
Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

The Web Programmer's Desk Reference
The Web Programmer's Desk Reference

One of the challenges of web programming is remembering what you can do with what, and what works with everything else. Sure, you can create a button, but can you change its color and font to match the style of your site? And are you sure it will look the same on all browsers? With The Web Programmer's Desk Reference, you can find...

The Book of Overclocking: Tweak Your PC to Unleash Its Power
The Book of Overclocking: Tweak Your PC to Unleash Its Power

The Book of Overclocking is the definitive guide to the art of running a PC’s processor faster than the manufacturer ever intended. Not only can overclocking help you squeeze another year or two out of older hardware, but maximizing your PC’s performance is also a lot of fun. Whether you’re a veteran overclocker or a...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy