Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Make Projects: Small Form Factor PCs
Make Projects: Small Form Factor PCs
Shoebox sized and smaller, small form factor PCs can pack as much computing muscle as anything from a PDA to a full-sized desktop computer. They consume less power, have few or no moving parts, and are very quiet. Whether you plan to use one as a standalone PC or want to embed it in your next hacking project, a small form factor PC may be the next...
Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Image analysis and processing is steadily gaining relevance within the large number of application fields to which genetic and evolutionary computation (GEC) techniques are applied. Although more and more examples of such applications can be found in literature, they are scattered, apart from a few exceptions, in proceedings and journals dedicated...
Running Xen: A Hands-On Guide to the Art of Virtualization
Running Xen: A Hands-On Guide to the Art of Virtualization
“This accessible and immediately useful book expertly provides the Xen community with everything it needs to know to download, build, deploy and manage Xen implementations.”

—Ian Pratt, Xen Project Leader VP Advanced Technology, Citrix Systems

CCNP ISCW Portable Command Guide (Self-Study Guide)
CCNP ISCW Portable Command Guide (Self-Study Guide)
Welcome to ISCW! In 2006, Cisco Press contacted Scott and told him, albeit very quietly, that there was going to be a major revision of the CCNP certification exams. They then asked whether he would be interested in working on a command guide in the same fashion as his previous books for Cisco Press: the Cisco Networking Academy Program CCNA...
Pattern Recognition, Third Edition
Pattern Recognition, Third Edition
A classic -- offering comprehensive and unified coverage with a balance between theory and practice!

Pattern recognition is integral to a wide spectrum of scientific disciplines and technologies including image analysis, speech recognition and audio classification, communications, computer-aided diagnosis, data mining. The authors,
...
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for...
Flex 3: A Beginner's Guide
Flex 3: A Beginner's Guide

Essential Skills--Made Easy!

Learn to program with Flex 3, the powerful tool for building multimedia-rich, interactive Flash applications for the Web. Flex 3: A Beginner's Guide is an easy-to-follow, fast-paced tutorial that allows you to fully grasp the fundamentals, including MXML, ActionScript, Flex Builder,...

JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
JavaTM Programming with CORBATM : Advanced Techniques for Building Distributed Applications
The leading guide for Java developers who build business applications with CORBA Acknowledged experts present advanced techniques and real-world examples for building both simple and complex programs using Java with CORBA. The authors begin with a quick overview of CORBA, Java, object request brokers (ORBs), and EJB components, then quickly move on...
MCSE Self-Paced Training Kit (Exam 70-217): Microsoft  Windows  2000 Active Directory  Services, Second Edition
MCSE Self-Paced Training Kit (Exam 70-217): Microsoft Windows 2000 Active Directory Services, Second Edition

Welcome to the MCSE Training Kit—Microsoft Windows 2000 Active Directory Services. This kit prepares you to install, configure, administer, monitor, and troubleshoot Microsoft Windows 2000 Active Directory.

This kit introduces you to Windows 2000 Active Directory and prepares you to plan, configure, and administer your...

Accelerated GWT: Building Enterprise Google Web Toolkit Applications
Accelerated GWT: Building Enterprise Google Web Toolkit Applications
Ajax is a web development technique that takes advantage of JavaScript to display and interact dynamically with information embedded into a web page. Its emergence has made it possible to create web applications that closely resemble their desktop–based brethren. With this exciting new ability came several challenges; not only did developers...
Java(tm) for S/390® and AS/400® COBOL Programmers
Java(tm) for S/390® and AS/400® COBOL Programmers
Written by mainframe and midrange professionals George Farr and Phil Coulthard, Java for S/390 & AS/400 COBOL Programmers is designed to help COBOL programmers make the jump to Java. It teaches COBOL programmers how to read and write Java programs and helps them understand the concepts necessary to continue to improve their Java skills. Rather...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy