A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...
Sit down at the keyboard and cinch that deal! Press the send button and get the account!
Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...
Accelerated C# 2005 teaches you both how to use core C# language concepts and wisely employ C# idioms and object-oriented design patterns--to exploit the power of C# and the common language runtime. You'll quickly master C# syntax while learning how the CLR simplifies many programming tasks. You'll also learn best practices that ensure...
Writing a WDM driver is much like writing a kernel-mode driver for Windows NT 4.0. It's a bit easier because you don't have to detect and configure your own hardware. Ironically, it's simultaneously harder because correctly handling Plug and Play and power management is fiendishly difficult. If...
QuickTime is the industry standard for developing and distributing multimedia content on the Web and CD-ROM, for both Windows and Macintosh computers. Its powerful, extensible software architecture lets you deliver state-of-the-art digital content over the Web or on CD-ROM.
This third edition of the best-selling and award-winning...
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...
Since the appearance in 1975 of this work, the field of combinatorial algorithms has continued its rapid evolution. We have substantially rewritten several of the chapters in order to take account of theoretical or algorithmic improvements, and to clarify the presentation.
This book presents both cutting-edge and established methods for studying cardiac gene expression. The protocols provide a template for solid research, and cover the process through screening, analysis, characterization, and functional confirmation of novel genes or known genes with a new function. The concluding section of the book...
This hands-on book shows readers why and how common Java development problems can be solved by using new Aspect-oriented programming (AOP) techniques. With a wide variety of code recipes for solving day-to-day design and coding problems using AOP's unique approach, AspectJ Cookbook demonstrates that AOP is more than...
'Rendering for Beginners is bound to become a must-read for anyone interested in Pixar's RenderMan. Saty's experience as both RenderMan practitioner and RenderMan teacher gives him a unique and valuable perspective. I can't wait to add a copy to my own graphics library.'
I started using R several years ago to analyze data I had collected for my research in
graduate school. My motivation at first was to escape from the restrictive environments
and canned analyses offered by statistical programs like SPSS. And even better, because
it’s freely available, I didn’t need to...
Research in Communication Sciences and Disorders: Methods for Systematic Inquiry, Fourth Edition is a comprehensive yet comprehendible text meant for instructors and students of research methods in the field of communication sciences and disorders. This forward-thinking book reflects the movement toward evidence-based practice in...