Managed Code Rootkits: Hooking into Runtime Environments
We live in a world in which we can’t trust our computers. For example, how can we
know for sure that our hardware manufacturer did not hide malicious code in the
system’s microchip? Or that our freshly installed operating system does not contain
backdoors created by a rogue developer from the OS development team?
Trading Between the Lines: Pattern Recognition and Visualization of Markets
Insights into a pattern-based method of trading that can increase the likelihood of profitable outcomes
While most books on chart patterns, or pattern recognition, offer detailed discussion and analysis of one type of pattern, the fact is that a single pattern may not be very helpful for trading, since it often does not give a...
VMware vSphere PowerCLI Reference: Automating vSphere Administration
The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...
|Result Page: 33 32 31 30 29 28 27 26 25 24 |