Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)

Change: It’s what we expect from technology, from the PC to the web, through to HD TV. But nothing has been as disruptive as the change the iPhone and Android phones have brought. For the first time the power of a computer will fit in your hand, you are always connected to the Internet, and these devices are loaded with...

Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Murach's C++ 2008 (Murach: Training & Reference)
Murach's C++ 2008 (Murach: Training & Reference)

Finally, a great training and reference book for Visual C++ by Dr. Prentiss Knowlton, an instructor of C++ since its inception. This book helps you master C++ 2008 quickly and easily by using all the time- and work-saving features of Visual Studio. That's true whether you're a:

  • Java developer who wants to learn...
Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
Designing for XOOPS: A Quickstart for Designers
Designing for XOOPS: A Quickstart for Designers

Before you dive into this book, I would like to first extend my warm welcome to you as you enter the world of XOOPS. XOOPS is an acronym of eXtensible Object Oriented Portal System. It is an open-source application platform and Content Management System (CMS) written in PHP. It is built for developing a variety of solutions...

Building XML Web Services for the Microsoft .NET Platform
Building XML Web Services for the Microsoft .NET Platform

You can hardly pick up a technical magazine, developer conference brochure, or corporate IT strategy document without seeing a reference to Web services. So what is all the hype about? Simply put, Web services allow developers to create unrestricted applications—applications that span different operating systems,...

Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers,...
Programming the Perl DBI
Programming the Perl DBI
The DBI is the standard database interface for the Perl programming language. The DBI is databaseindependent, which means that it can work with just about any database, such as Oracle, Sybase, Informix, Access, MySQL, etc.

While we assume that readers of this book have some experience with Perl, we don't assume much familiarity with
...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 Disk
Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 Disk
This book is a tutorial on image processing. Each chapter explains basic concepts with words and gures, shows image processing results with photographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book published in 1994....
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy