Home | Amazing | Today | Tags | Publishers | Years | Search 
Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

The Java Tutorial: A Short Course on the Basics, 4th Edition (The Java Series)
The Java Tutorial: A Short Course on the Basics, 4th Edition (The Java Series)

A hands-on guide to the Java programming language, The Java™ Tutorial, Fourth Edition is perfect for any developer looking for a proven path to proficiency with Java SE. This popular tutorial "from the Source" has been completely revised and...

Dynamic Html in Action
Dynamic Html in Action

This is the second edition of Dynamic HTML in Action. We conceived the idea for the first edition of this book when we were developing computer applications with early beta versions of Microsoft Internet Explorer 4. At the time, we knew of no resource that demonstrated how the various emerging technologies for the World Wide Web could...

Anti-Hacker Tool Kit, Third Edition
Anti-Hacker Tool Kit, Third Edition
THWART THE LATEST DISASTROUS ATTACKS

Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the...

Transact-SQL Desk Reference: For Microsoft SQL Server
Transact-SQL Desk Reference: For Microsoft SQL Server

This is the SQL reference you'll reach for first, every time!

If you're an SQL programmer, you can easily picture how useful a comprehensive, single-volume Transact-SQL command reference manual would be in streamlining your work. And if that book was rich in examples, was written with users of all levels of expertise in mind, and was...

C# and the .Net Framework: The C++ Perspective
C# and the .Net Framework: The C++ Perspective
This book covers topics ranging from the general principles of .NET through the C# language and how its used in ASP.NET and Windows Forms. Written by programmers for programmers, the content of the book is intended to get readers over the hump of the .NET learning curve and provide solid practical knowledge that will make developers productive from...
Programming Data Driven Web Applications with ASP.NET
Programming Data Driven Web Applications with ASP.NET
Programming Data-Driven Web Applications with ASP.NET provides readers with a solid understanding of ASP.NET and how to effectively integrate databases with their Web sites. The key to making information instantly available on the Web is integrating the Web site and the database to work as one piece. The authors teach this using ASP.NET,...
Head Rush Ajax
Head Rush Ajax
Sick of creating web sites that reload every time a user moves the mouse? Tired of servers that wait around to respond to users' requests for movie tickets? It sounds like you need a little (or maybe a lot of) Ajax in your life. Asynchronous programming lets you turn your own websites into smooth, slick, responsive applications that make your users...
Korn Shell: Unix and Linux Programming Manual, Third Edition
Korn Shell: Unix and Linux Programming Manual, Third Edition
If you are a Unix or Linux Shell programmer, this book will provide you with the practical advice and technical tips you will need in order to become proficient in all aspects of the Korn Shell and enhance your programming skills. From basic introductory concepts through to advanced programming techniques, you will learn how to-
Customize
...
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Result Page: 448 447 446 445 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy