|
|
|
|
|
CNET Do-It-Yourself PC Upgrade ProjectsSupercharge and customize your PC
Now you can get the most out of your PC with the fun and practical projects packed inside this easy-to-follow guide. Produced in conjunction with CNET.com, the place you go for the latest in tech and consumer electronics, this book shows you how to exploit the media, communications,... | | Unity 3 Game Development Hotshot
Only Unity fits the bill of being a game engine that allows you to create a full 3D game for free, and with phenomenal community support. This book will equip you with the skills to create professional looking games at no cost.
Unity 3 Game Development Hotshot will teach you how to exploit the full array of Unity 3D's... | | Exploiting Software : How to Break CodeHow does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools,... |
|
| | Java 8 Recipes
Java 8 Recipes offers solutions to common programming problems encountered while developing Java-based applications. Fully updated with the newest features and techniques available, Java 8 Recipes provides code examples involving Lambdas, embedded scripting with Nashorn, the new date-time API, stream support, functional... | | Nonlinear Signal Processing : A Statistical ApproachA Unified Treatment of Non-Gaussian Processes and Nonlinear Signal Processing
Nonlinear signal processing methods are finding numerous applications in such fields as imaging, teletraffic, communications, hydrology, geology, and economics–fields where nonlinear systems and non-Gaussian processes emerge. Within a broad class of nonlinear... |
|
A Technical Guide to IPSec Virtual Private NetworksThis book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison... | | Implementing Samba 4
Exploit the real power of Samba 4 Server by leveraging the benefits of an Active Directory Domain Controller
Overview
-
Understand the different roles that Samba 4 Server can play on the network
-
Implement Samba 4 as an Active Directory Domain Controller
-
Step-by-step and...
| | Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |