 |
|
|
|
 |  |  |  |  Snort CookbookIf you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an... |
|
 Microsoft Windows security inside out for Windows XP and Windows 2000Hey, you know your way around a desktop-so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds-all... |  |  Circuit Systems with MATLAB and PSpice
Software tools applied to circuit analysis and design are rapidly evolving, enabling students to move beyond the time-consuming, math-intensive methods of traditional circuit instruction. By incorporating MATLAB 7.0 and PSpice 10.0, alongside systematic use of the Laplace transform, Yang and Lee help readers rapidly gain an intuitive ... |  |  ARM® Cortex® M4 Cookbook
About This Book
-
This book focuses on programming embedded systems using a practical approach
-
Examples show how to use bitmapped graphics and manipulate digital audio to produce amazing games and other multimedia applications
-
The recipes in this book are written using ARM's MDK
... |
|
 IBM DB2 9.7 Advanced Application Developer Cookbook
Welcome to the DB2 9.7 Advanced Application Developer Cookbook. DB2 9.7 is a truly incredible database product from IBM, which offers an excellent mix of application performance, reliability, and ease of development enablement.
In this cookbook, you can find both: hands-on and real world practical application development examples, as well... |  |  |  |  CD Cracking Uncovered: Protection Against Unsanctioned CD CopyingA manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver... |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 |