Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer)
Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer)
The premier guide to the Windows kernel now covers Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensions. Get the architectural perspectives and insider insights needed to unlock the power of Windows.

The classic, in-depth developer's guide to the Windows kernel now covers Windows .NET Server 2003, Windows XP,
...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Programming Microsoft. NET XML Web services
Programming Microsoft. NET XML Web services

Get the in-depth reference and guidance you need to create and consume high-performance, cross-platform Web solutions in the Microsoft .NET environment. This exhaustive resource cuts to the heart of developing XML Web services and their clients—offering expert insights on the relevant standards, .NET classes, and key design and...

CNET Do-It-Yourself PC Upgrade Projects
CNET Do-It-Yourself PC Upgrade Projects

Supercharge and customize your PC

Now you can get the most out of your PC with the fun and practical projects packed inside this easy-to-follow guide. Produced in conjunction with CNET.com, the place you go for the latest in tech and consumer electronics, this book shows you how to exploit the media, communications,...

Unity 3 Game Development Hotshot
Unity 3 Game Development Hotshot

Only Unity fits the bill of being a game engine that allows you to create a full 3D game for free, and with phenomenal community support. This book will equip you with the skills to create professional looking games at no cost.

Unity 3 Game Development Hotshot will teach you how to exploit the full array of Unity 3D's...

Exploiting Software : How to Break Code
Exploiting Software : How to Break Code
How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools,
...
Interference Calculus: A General Framework for Interference Management and Network Utility Optimization
Interference Calculus: A General Framework for Interference Management and Network Utility Optimization

This book develops a mathematical framework for modeling and optimizing interference-coupled multiuser systems. At the core of this framework is the concept of general interference functions, which provides a simple means of characterizing interdependencies between users. The entire analysis builds on the two core axioms scale-invariance and...

Java 8 Recipes
Java 8 Recipes

Java 8 Recipes offers solutions to common programming problems encountered while developing Java-based applications. Fully updated with the newest features and techniques available, Java 8 Recipes provides code examples involving Lambdas, embedded scripting with Nashorn, the new date-time API, stream support, functional...

Nonlinear Signal Processing : A Statistical Approach
Nonlinear Signal Processing : A Statistical Approach
A Unified Treatment of Non-Gaussian Processes and Nonlinear Signal Processing

Nonlinear signal processing methods are finding numerous applications in such fields as imaging, teletraffic, communications, hydrology, geology, and economics–fields where nonlinear systems and non-Gaussian processes emerge. Within a broad class of nonlinear...

A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

Implementing Samba 4
Implementing Samba 4

Exploit the real power of Samba 4 Server by leveraging the benefits of an Active Directory Domain Controller

Overview

  • Understand the different roles that Samba 4 Server can play on the network
  • Implement Samba 4 as an Active Directory Domain Controller
  • Step-by-step and...
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy