Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
Write Great Code: Understanding the Machine
Write Great Code: Understanding the Machine

This, the first volume in Randall Hyde’s Write Great Code series, dives into machine organization without the extra overhead of learning assembly language programming. Written for C/C++, VB, Pascal, Java, and other high-level language programmers, Volume I, “Understanding the Machine,” fills in the low-level details...

The Web Programmer's Desk Reference
The Web Programmer's Desk Reference

One of the challenges of web programming is remembering what you can do with what, and what works with everything else. Sure, you can create a button, but can you change its color and font to match the style of your site? And are you sure it will look the same on all browsers? With The Web Programmer's Desk Reference, you can find...

The Official GNOME 2 Developer's Guide
The Official GNOME 2 Developer's Guide
Developers who write programs for GNOME use the GNOME API. Working with the GNOME API is preferable because the program will conform to the standard GNOME program look and feel. It also allows the developer to use the GNOME specific libraries in the program, greatly simplifying the development process. GNOME 2.0 is the official GNOME Foundation...
Steal This File Sharing Book
Steal This File Sharing Book

Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song...

Wicked Cool Perl Scripts : Useful Perl Scripts That Solve Difficult Problems
Wicked Cool Perl Scripts : Useful Perl Scripts That Solve Difficult Problems

You can do a lot of strange and wonderful things with the Perl language—if you know how. Many Perl programmers have been frustrated at one time or another because the system was missing some simple and obvious utility. Wicked Cool Perl Scripts is your guide to writing those utilities quickly and easily.

This book contains a wide...

Write Great Code, Volume 2: Thinking Low-Level, Writing High-Level
Write Great Code, Volume 2: Thinking Low-Level, Writing High-Level
No prior knowledge of assembly language required!

In the beginning, most software was written in assembly, the CPU’s low-level language, in order to achieve acceptable performance on relatively slow hardware. Early programmers were sparing in their use of high-level language code, knowing that a high-level language compiler would...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Wicked Cool Java : Code Bits, Open-Source Libraries, and Project Ideas
Wicked Cool Java : Code Bits, Open-Source Libraries, and Project Ideas
Wicked Cool Java contains 101 fun, interesting, and useful ways to get more out of Java. This isn't intended as a Java tutorial--it's targeted at developers and system architects who have some basic Java knowledge but may not be familiar with the wide range of libraries available. Full of example code and ideas for combining them in useful...
Wicked Cool Shell Scripts
Wicked Cool Shell Scripts

This cookbook of useful, customizable, and fun scripts gives you the tools to solve common Linux, Mac OS X and UNIX problems and personalize your computing environment.

The UNIX shell is the main scripting environment of every Linux, Mac OS X and UNIX system, whether a rescued laptop or a million-dollar mainframe. This cookbook of...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

**Covers Nagios 2.0**

"WOW! This books is incredibly detailed and Wolfgang has done an excellent job. I don't think I could have gone into that much detail if I wrote a book mysel. Kudos!" —Ethan Galstad, Nagios main developer

Good system administrators know about problems long before anyone asks,...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy