Hacker Disassembling Uncovered This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
This book is dedicated to the basics of hacking—methods of analyzing programs using a...
Advanced Batteries: Materials Science Aspects Energy is important to all of us, for a variety of reasons, but primarily because it can be useful. It can be found in a number of different forms. One readily recognizes the concepts of potential energy and kinetic energy, as well as the chemical energy in fuels, thermal energy as heat, the kinetic energy in wind and moving water, and magnetic and... ASP.NET MVC 4 in Action
The ASP.NET MVC framework has come a long way over the last few years.
It was originally the vision of Scott Guthrie in early 2007, and with a subsequent
prototype demonstration in late 2007 and the hire of Phil Haack as a Senior Program
Manager, this vision became a reality. Several public previews...
Java in a Nutshell, Fourth Edition
Java just keeps growing, adding features, functionality, complexity, and tempting developers to growl with frustration. The new 1.4 release of Java 2 Standard edition increases the size of the platform by 50%, to 2757 classes in 135 packages. How are you going to figure out what this means for your applications? As always, Java in...
Introducing Microsoft® Silverlight(TM) 3
As the Web grows and evolves, so do the expectations of the Web user. When the first
Web browser was developed, it was created to provide a relatively simple way to allow
hyperlinking between documents. Then these early browsers were coupled with the
cross-machine protocols encompassing the Internet, and suddenly documents stored on...
|Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |