 |
|
|
|
 CD Cracking Uncovered: Protection Against Unsanctioned CD CopyingA manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver... |  |  Extreme Exploits: Advanced Defenses Against Hardcore HacksProtect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses... |  |  Mac OS X Advanced Development Techniques Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.
The book concentrates on teaching Cocoa development first, and then takes that knowledge and... |
|
 Linux Network ArchitectureThis book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a... |  |  Digital Design (3rd Edition)Digital design is concerned with the design of digital electronic circuits. Digital circuits are employed in the design and construction of systems such as digital computers, data communication, digital recording, and many other applications that require digital hardware. This book presents the basic tools for the design of digital circuits and... |  |  The Database Hacker's Handbook: Defending Database ServersDatabases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.
In this essential follow-up to... |
|
| Result Page: 447 446 445 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 |