Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

QuickTime for Java: A Developer's Notebook
QuickTime for Java: A Developer's Notebook
Java developers who need to add audio, video, or interactive media creation and playback to their applications find that QuickTime Java is a powerful toolkit, but one that's not easy to get into. This book offers the first real look at this important software with an informal, code-intensive style that lets impatient early adopters focus on...
AutoCAD Platform Customization: User Interface and Beyond
AutoCAD Platform Customization: User Interface and Beyond
Welcome to AutoCAD Platform Customization*. Have you ever thought about customizing the Autodesk® AutoCAD® program only to think it is not for you because you're not a programmer? If so, you are not alone—many people connect customization with programming. However, customization is not the same as programming,...
  
   
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy