Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
openSUSE Linux Unleashed
openSUSE Linux Unleashed
DVD Includes openSUSE 10.3

 

openSUSE Linux Unleashed presents comprehensive coverage of the community version of SUSE Linux, one of the most popular and most complete Linux distributions in the world.

 

This book...

Support Vector Machines for Pattern Classification (Advances in Pattern Recognition)
Support Vector Machines for Pattern Classification (Advances in Pattern Recognition)

Support vector machines (SVMs), were originally formulated for two-class classification problems, and have been accepted as a powerful tool for developing pattern classification and function approximations systems. This book provides a unique perspective of the state of the art in SVMs by taking the only approach that focuses on classification...

RHCE - RH302 Red Hat Certified Engineer Certification Exam Preparation Course in a Book for Passing the RHCE
RHCE - RH302 Red Hat Certified Engineer Certification Exam Preparation Course in a Book for Passing the RHCE

This self-study exam preparation guide for the RHCE - RH302 Red Hat Certified Engineer exam contains everything you need to test yourself and pass the Exam. Including all the exam topics, covered indepth and insider secrets, complete explanations of all RHCE subjects, test tricks and tips, over 250 highly realistic sample questions, and...

ISA System Architecture (3rd Edition)
ISA System Architecture (3rd Edition)

*ISA System Architecture describes the hardware architecture of ISA (Industry Standard Architecture), providing a clear, concise explanation of an ISA system in detail. The authors provide a comprehensive treatment of the bus including: **-bus cycles *-addressing *-I/O *-RAM, ROM, and cache memory *-cache architectures *-decode and reset...

Learning Theory: 20th Annual Conference on Learning Theory, COLT 2007, San Diego, CA, USA, June 13-15, 2007
Learning Theory: 20th Annual Conference on Learning Theory, COLT 2007, San Diego, CA, USA, June 13-15, 2007
This book constitutes the refereed proceedings of the 20th Annual Conference on Learning Theory, COLT 2007, held in San Diego, CA, USA in June 2007.

The 41 revised full papers presented together with 5 articles on open problems and 2 invited lectures were carefully reviewed and selected from a total of 92 submissions. The papers cover a wide...

Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)

UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data...

Remote Sensing Image Analysis: Including the Spatial Domain (Remote Sensing and Digital Image Processing)
Remote Sensing Image Analysis: Including the Spatial Domain (Remote Sensing and Digital Image Processing)
Remote Sensing image analysis is mostly done using only spectral information on a pixel by pixel basis. Information captured in neighbouring cells, or information about patterns surrounding the pixel of interest often provides useful supplementary information. This book presents a wide range of innovative and advanced image processing methods for...
Mastering the Raspberry Pi
Mastering the Raspberry Pi

You probably already know that the Raspberry Pi is an excellent teaching tool. If you want to teach Linux basics or Python programming or basic electronics, it's a great place to start. But what if you are an electronics engineer or a Linux systems administrator or a very experienced maker? You want to know all of the details and inner...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy