Home | Amazing | Today | Tags | Publishers | Years | Search 
Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

100 Things You Need to Know about Microsoft Windows Vista
100 Things You Need to Know about Microsoft Windows Vista
The purpose of this book is to provide you with information, tips, and tricks about using and transitioning to Windows Vista.

Although there are many other books published that discuss Windows Vista, most cover basic tasks (such as printing and opening documents) and are tailored toward those less experienced in computers. If you have...

Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 Disk
Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 Disk
This book is a tutorial on image processing. Each chapter explains basic concepts with words and gures, shows image processing results with photographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book published in 1994....
Google Maps Mashups with Google Mapplets (Firstpress)
Google Maps Mashups with Google Mapplets (Firstpress)
Have a Google Maps mashup that you’d like to expose to millions of users on maps.google.com? New to the mapping craze, but have an idea for a killer map–based application? Want to learn how to create GeoRSS and KML feeds with your geotagged content, exposing your customer to new ways of exploring and navigating your content?...
Special Edition Using Microsoft Windows Vista (2nd Edition)
Special Edition Using Microsoft Windows Vista (2nd Edition)
We all know this book will make an effective doorstop in a few years. You probably have a few already. (We've even written a few!) If you think it contains more information than you need, just remember how helpful a good reference can be when you need it at the 11th hour. And we all know that computer technology changes so fast that it's sometimes...
Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit
Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit
In just 24 sessions of one hour or less, you will be up and running with Visual Basic 2008. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of Visual Basic 2008 from the ground up. Step-by-step instructions carefully...
XML Primer Plus
XML Primer Plus
Undoubtedly, you've heard of Extensible Markup Language, commonly known as XML. You may have even seen some of it, though you might not have been aware of it at the time. One thing's fairly certain, however: You'll be seeing a lot more of it in the future.

My certainty is based on the fact that XML is beginning to spread at a pace that
...
Mastering Microsoft Visual Basic 2008
Mastering Microsoft Visual Basic 2008
Welcome to Visual Basic 2008, the most mature version yet of the most popular programming language for building Windows and web applications. In modern software development, however, the language is only one of the components we use to build applications. The most important component is the .NET Framework, which is an indispensable component of...
Check Point NGX R65 Security Administration
Check Point NGX R65 Security Administration
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity...
Protecting Your Library's Digital Sources: The Essential Guide to Planning and Preservation
Protecting Your Library's Digital Sources: The Essential Guide to Planning and Preservation
Today libraries, archives, and organizations of every size are creating websites with digital materials that they maintain day in and day out. Some repositories are digitizing written works in the public domain and putting them on the Web and on CD-ROM (or equivalent technology) to make them accessible to the public, with the twofold aim of (1)...
Knoppix Hacks: Tips and Tools for Using the Linux Live CD to Hack, Repair, and Enjoy Your PC
Knoppix Hacks: Tips and Tools for Using the Linux Live CD to Hack, Repair, and Enjoy Your PC
If you think Knoppix is just a Linux demo disk, think again. Klaus Knopper created an entire Linux distribution on a bootable CD (and now a DVD) so he could use his favorite open source tools on any computer. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play,...
Result Page: 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy