Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Michael Abrash's Graphics Programming Black Book (Special Edition)
Michael Abrash's Graphics Programming Black Book (Special Edition)
Michael Abrash's Graphics Programming Black Book is a collection of the author's previous books on assembly language and graphics programming, as well as past columns for Dr. Dobb's magazine. Though much of the book (such as 8088/286/386 assembly language optimization and VGA graphics programming) is out-of-date by now, the reader can see...
Trading to Win: The Psychology of Mastering the Markets (Wiley Trading)
Trading to Win: The Psychology of Mastering the Markets (Wiley Trading)
A breakthrough programfor achieving new heights of trading success

The product of a five-year collaboration between Dr. Ari Kiev, a leading psychiatrist renowned for his success with Olympic athletes, and top equities trader Steve Cohen, Trading to Win gives you the essential tools to overcome outmoded, self-limiting beliefs and mindsets that...

Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Embedded systems are electronic systems that include a microprocessor to perform certain specific tasks. The microprocessor is embedded or hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny chips come out of factories like Freescale, Microchip, Philips, Texas Instruments, and Mitsubishi,...
Programming Embedded Systems: With C and GNU Development Tools
Programming Embedded Systems: With C and GNU Development Tools

If you have programming experience and a familiarity with C--the dominant language in embedded systems--Programming Embedded Systems, Second Edition is exactly what you need to get started with embedded software. This software is ubiquitous, hidden away inside our watches, DVD players, mobile...

2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Beginning ASP .NET 2.0 E-Commerce in C# 2005: From Novice to Professional
Beginning ASP .NET 2.0 E-Commerce in C# 2005: From Novice to Professional
Welcome to Beginning ASP.NET 2.0 E-Commerce in C# 2005: From Novice to Professional! The
explosive growth of retail over the Internet is encouraging more small- to medium-sized businesses
to consider the benefits of setting up e-commerce web sites. Although online retailing has
great and obvious advantages, there are also many hidden
...
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
Skype Me!: From Single User to Small Enterprise and Beyond
Skype Me!: From Single User to Small Enterprise and Beyond
You are going to love Skype Me! From Single User to Small Enterprise and Beyond. Here’s why: Michael Gough knows his stuff. Michael has also completed a remarkably difficult project around a remarkably cool product, Skype.

Michael is a busy guy. I have no idea where he found time to write a
...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Digital SLR Cameras & Photography For Dummies
Digital SLR Cameras & Photography For Dummies

Get the lowdown on megapixels, lenses, and filters

Choose the right camera and accessories, get perfect shots, and edit like a pro

Excited about that new digital SLR and eager to find inventive ways to put all its features to work? This book will help! It shows you (in rich, full color) exactly what you and your...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy