Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Linux Cookbook, Second Edition
The Linux Cookbook, Second Edition
The Linux Cookbook, 2nd Edition is your guide to getting the most out of Linux. Organized by general task (such as working with text, managing files, and manipulating graphics), each section contains a series of step-by-step recipes that help you to get your work done quickly and efficiently, most often from the command line. Nearly 50...
Hacking the Xbox: An Introduction to Reverse Engineering
Hacking the Xbox: An Introduction to Reverse Engineering
This--this being the attitude encapsulated in Andrew "bunnie" Huang's Hacking the Xbox--is why a lot of people got into the computer industry in the first place. These people liked taking things apart and figuring out how they worked, then making them serve purposes they weren't originally designed for and sharing the new discoveries with...
The Book of JavaScript: A Practical Guide to Interactive Web Pages
The Book of JavaScript: A Practical Guide to Interactive Web Pages
Most Web developers pick up a book to learn how to use a language like JavaScript, looking for practical examples of how to get things done. The Book of JavaScript: A Practical Guide to Interactive Web Pages is plenty practical, and hits the mark as a reader-friendly and well-organized tutorial on JavaScript.

The book...

How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
". . . a unique book that is fun to read while still providing valuable information." -- CodeGuru.com

". . .[like] cross training with the drill sergeant of debugging. . ." -- Chris Pelsor, Flash Developer

"If you have been programming in C++ for a while, this book is and excellent
...
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into...
Growing Software: Proven Strategies for Managing Software Engineers
Growing Software: Proven Strategies for Managing Software Engineers

As the technology leader at a small software company, you need to focus on people, products, processes, and technology as you bring your software to market, while doing your best to put out fires and minimize headaches.

Growing Software is your guide to juggling the day-to-day challenges of running a software company while...

The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

The Book of JavaScript, 2nd Edition: A Practical Guide to Interactive Web Pages
The Book of JavaScript, 2nd Edition: A Practical Guide to Interactive Web Pages
The Book of JavaScript teaches readers how to add interactivity, animation, and other tricks to their web sites with JavaScript. Rather than provide a series of cut-and-paste scripts, thau! takes the reader through a series of real world JavaScript code with an emphasis on understanding. Each chapter focuses on a few important JavaScript...
Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

The Book of Xen: A Practical Guide for the System Administrator
The Book of Xen: A Practical Guide for the System Administrator
Virtualization is cool. I’ve always had a soft spot for virtualization, since as a lifelong sysadmin I get pretty tired of the endless fine-tuning that goes into building a successful network “host.” Especially when that fine-tuning evolves into upgrades involving screwdrivers, recabling, and dust.

While Xen
...
The Google Way: How One Company Is Revolutionizing Management as We Know It
The Google Way: How One Company Is Revolutionizing Management as We Know It

Shortly after World War I, Ford and GM created the large modern corporation, with its financial and statistical controls, mass production, and assembly lines. In the 1980s, Toyota stood out for combining quality with continuous refinement. Today, Google is reinventing business yet again-the way we work, how organizations are controlled,...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy