Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems

Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project

Key Features

  • Make the most of Ghidra on different platforms such as Linux, Windows, and macOS
  • Leverage a variety of...
Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops
Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops

Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for...

Computer Architecture and Implementation
Computer Architecture and Implementation

In this textbook Harvey Cragon provides a clear introduction to computer architecture and implementation. He interweaves two important themes throughout: the major concepts and design philosophies of computer architecture and organization, and analytic modeling of computer performance. The author begins by describing the classic von Neumann...

Modern Operating Systems (2nd Edition) (GOAL Series)
Modern Operating Systems (2nd Edition) (GOAL Series)
The widely anticipated revision of this worldwide best seller incorporates the latest developments in operating systems technologies. Hundreds of pages of new material on a wealth of subjects have been added. This authoritative, example-based reference offers practical, hands-on information in constructing and understanding modern operating...
Composing Music with Computers (Music Technology)
Composing Music with Computers (Music Technology)

Focuses on the role of the computer as a generative tool for music composition. Miranda introduces a number of computer music composition techniques ranging from probabilities, formal grammars and fractals, to genetic algorithms, cellular automata and neural computation. Anyone wishing to use the computer as a companion to create music will...

Hacking Windows Vista: ExtremeTech
Hacking Windows Vista: ExtremeTech

"Why didn't they ask me before they did that?"

Vista is the most radical revamping of Windows since 1995. But along with all the fantastic improvements, there are a couple of things that drive you up the wall. Maybe you're not seeing the performance you expect. Security is better, but boy, is it annoying. And what's with...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Absolute Beginner's Guide to WordPerfect X3
Absolute Beginner's Guide to WordPerfect X3
Update to the most popular WordPerfect book on the market! Whether you just bought a computer that has WordPerfect installed or you need to learn it for use at the office, Absolute Beginner's Guide to WordPerfect X3 will have you up and running with the latest version of WordPerfect in no time. Endorsed by...
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

Learn Cocoa Touch for iOS (Learn Apress)
Learn Cocoa Touch for iOS (Learn Apress)

With every successive release of iOS and its related hardware products, Apple and journalists the world over spout hyperbolic statements about “revolutionary” features, “insanely great” devices, and “unbelievable” sales. The numbers don’t disappoint, with hundreds of millions of iOS devices having...

Getting Started with OUYA
Getting Started with OUYA

A practical guide to developing games for the revolutionary OUYA console

About This Book

  • Learn the basic principles of game development for the OUYA console
  • Get to know the business model, content types, and specifications of the OUYA console
  • Develop your first project for...
Future Interaction Design
Future Interaction Design
The perspectives and techniques used in human-computer interaction design, practice and research are broadening. This book looks at emerging approaches which are likely to contribute to the discipline in near future. The emphasis is on the social, cognitive, emotional, creative and active dimensions of the human actor. The underlying idea is that...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy