Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
Kernel Methods for Pattern Analysis
Kernel Methods for Pattern Analysis
'Kernel methods form an important aspect of modern pattern analysis, and this book gives a lively and timely account of such methods. ... if you want to get a good idea of the current research in this field, this book cannot be ignored.' SIAM Review '... the book provides an excellent overview of this growing field. I highly recommend it to those...
How Linux Works: What Every Superuser Should Know
How Linux Works: What Every Superuser Should Know

Unlike some operating systems, Linux doesn't try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.

In this completely revised second...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Exploring SE for Android
Exploring SE for Android

Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

About This Book

  • Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
  • Build and enable current security enhancements from the SE for Android project...
Programming the Microsoft Windows Driver Model, Second Edition
Programming the Microsoft Windows Driver Model, Second Edition

Writing a WDM driver is much like writing a kernel-mode driver for Windows NT 4.0. It's a bit easier because you don't have to detect and configure your own hardware. Ironically, it's simultaneously harder because correctly handling Plug and Play and power management is fiendishly difficult. If...

Embedded Linux Projects Using Yocto Project Cookbook
Embedded Linux Projects Using Yocto Project Cookbook

Over 70 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto know-how

About This Book

  • Explore best practices for all embedded product development stages
  • Use what is quickly becoming the standard embedded Linux product builder framework, the Yocto...
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

The Linux Kernel Module Programming Guide
The Linux Kernel Module Programming Guide
Linux Kernel Module Programming Guide is for people who want to write kernel modules. It takes a hands-on approach starting with writing a small "hello, world" program, and quickly moves from there. Far from a boring text on programming, Linux Kernel Module Programming Guide has a lively style that entertains while it educates. An...
Linux Timesaving Techniques For Dummies
Linux Timesaving Techniques For Dummies
Fine-tune Linux for peak performance and usability!

Over 60 techniques that help you save time by…

  • Controlling time-consuming tasks
  • Improving your system security
  • Getting the most from your file system
  • Automating repetitive tasks
  • Tweaking the kernel on your...
The FreeBSD Handbook
The FreeBSD Handbook

The FreeBSD Handbook comes with the full FreeBSD Operating System on 1 CDROM. FreeBSD is a powerful, professional quality UNIX-compatible operating system.

The FreeBSD Handbook is a comprehensive FreeBSD tutorial and reference. It covers installation, day-to-day use of FreeBSD, and much more, such as the Ports collection, creating...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy