Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Why IPTV: Interactivity, Technologies, Services (Telecoms Explained)
Why IPTV: Interactivity, Technologies, Services (Telecoms Explained)
Find out how modern IPTV technologies will change your experience of television.

Internet Protocol Television (IPTV) is rapidly being deployed as a compliment service to existing distribution technologies.

Why IPTV? traces the changes in Internet Protocol Television since...

Beowulf Cluster Computing with Linux, Second Edition (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux, Second Edition (Scientific and Engineering Computation)
This how-to guide provides step-by-step instructions for building a Beowulf-type computer, including the physical elements that make up a clustered PC, the software required, and insights on how to organize the code to exploit parallelism.

Use of Beowulf clusters (collections of off-the-shelf commodity computers programmed to act in...

C# Class Design Handbook: Coding Effective Classes
C# Class Design Handbook: Coding Effective Classes

The mission of the C# Class Design Handbook is to provide you with a critical understanding of designing classes, making you better equipped to take full advantage of C#’s power to create robust, flexible, reusable classes. This comprehensive guide lifts the lid on syntax and examines what’s really going on behind the...

Scalable Hardware Verification with Symbolic Simulation
Scalable Hardware Verification with Symbolic Simulation
Scalable Hardware Verification with Symbolic Simulation presents recent advancements in symbolic simulation-based solutions which radically improve scalability. It overviews current verification techniques, both based on logic simulation and formal verification methods, and unveils the inner workings of symbolic simulation. The...
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic...
Programming Microsoft Office Access 2003 (Core Reference)
Programming Microsoft Office Access 2003 (Core Reference)

Whether you’re extending an existing database or developing a complex custom solution, get the code and instruction you need to exploit the power and performance of Access 2003. The newest edition o this acclaimed reference packs even more real-world examples and best practices for writing, testing, and debugging extensible database...

Advanced Photoshop Elements 5.0 for Digital Photographers
Advanced Photoshop Elements 5.0 for Digital Photographers
Once you have mastered the fundamentals, this easy-to-follow, advanced guide takes you to new levels of expertise. Advance your skills and artistry far beyond the basics with expert guidance from the top industry insider to achieve professional-level results. Find innovative ways to exploit the new features of Elements 5.0 to achieve outstanding...
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference

Cutting planes (cuts) are very popular in the OR community, where they are used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer Programs (MIPs) in the hope of improving the performance of an exact LPbased solver. In particular, an intense research effort has been devoted to the study of families of general cuts,...

Java 7 Recipes: A Problem-Solution Approach
Java 7 Recipes: A Problem-Solution Approach

Java 7 Recipes offers solutions to common programming problems encountered every day while developing Java-based applications. Fully updated with the newest features and techniques available, Java 7 Recipes provides code examples involving Servlets, Java FX 2.0, XML, Java Swing, and much more. Content is presented in the...

Practical Programming in Tcl and Tk (4th Edition)
Practical Programming in Tcl and Tk (4th Edition)

Tcl stands for Tool Command Language. Tcl is really two things: a scripting language, and an interpreter for that language that is designed to be easy to embed into your application. Tcl and its associated graphical user-interface toolkit, Tk, were designed and...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy