Managed Code Rootkits: Hooking into Runtime Environments
We live in a world in which we can’t trust our computers. For example, how can we
know for sure that our hardware manufacturer did not hide malicious code in the
system’s microchip? Or that our freshly installed operating system does not contain
backdoors created by a rogue developer from the OS development team?
Head First PHP & MySQL (A Brain-Friendly Guide) If you're ready to create web pages more complex than those you can build with HTML and CSS, Head First PHP & MySQL is the ultimate learning guide to building dynamic, database-driven websites using PHP and MySQL. Packed with real-world examples, this book teaches you all the essentials of server-side programming, from the fundamentals... Mastering Perl
Take the next step toward Perl mastery with advanced concepts that make coding easier, maintenance simpler, and execution faster. Mastering Perl isn't a collection of clever tricks, but a way of thinking about Perl programming for solving debugging, configuration, and many other real-world problems you’ll encounter...
Mastering .NET Machine Learning
About This Book
Based on .NET framework 4.6.1, includes examples on ASP.NET Core 1.0
Set up your business application to start using machine learning techniques
Familiarize the user with some of the more common .NET libraries for machine learning
With the combination of...
Beginning Red Hat Linux 9 (Programmer to Programmer) Red Hat Linux 9 is a powerful, flexible open source operating system. Its popularity is growing, both in home use and in corporate environments of all sizes. Its user interface makes it every bit as accessible as other operating systems, and its open source pedigree opens the doors to a mind-blowing amount of free software.
This book guides you...
Mac OS X Leopard For Dummies (Computer/Tech) "…the book admirably teaches a useful range of keyboard short cuts…a good introduction to the Mac." (Mac User, February 2008)
Mac OS X Leopard is the new cat in town, and wait until you see all the tricks it can do! Whether you’re new to the Mac or a longtime Mac-thusiast,...
Cyberdeterrence and Cyberwar
This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...
HTML5 Canvas For Dummies
Create eye-popping visuals on the fly with HTML5 Canvas
|Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |