Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Game Hacking: Developing Autonomous Bots for Online Games
Game Hacking: Developing Autonomous Bots for Online Games

You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.

Bring your knowledge of Windows-based development and memory management, and Game...

Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Application of Nanotechnology in Water Research
Application of Nanotechnology in Water Research

Details the water research applications of nanotechnology in various areas including environmental science, remediation, membranes, nanomaterials, and water treatment

At the nano size, materials often take on unique and sometimes unexpected properties that result in them being ‘tuned’ to build faster, lighter,...

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...

Visual Modeling with Rational Rose 2000 and UML
Visual Modeling with Rational Rose 2000 and UML
The Unified Modeling Language (UML) offers standard semantics and notation for describing object structure and behavior and has emerged as the design medium of choice for developing large-scale distributed object applications. Augmented by the Rational Unified Process, an extensive set of software development guidelines, and the Rational Rose...
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Economics / Investments & Securities

Praise for Reverse Engineering Deals on Wall Street with Microsoft Excel

"Allman has written an excellent sequel to his first book Modeling Structured Finance Cash Flows with Microsoft Excel, providing a simple guide on how to deconstruct cash flows through modeling and understanding...

Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World

Build a working knowledge of data modeling concepts and best practices, along with how to apply these principles with ER/Studio. This second edition includes numerous updates and new sections including an overview of ER/Studio's support for agile development, as well as a description of some of ER/Studio's newer features for NoSQL,...

Invisible Forces and Powerful Beliefs: Gravity, Gods, and Minds
Invisible Forces and Powerful Beliefs: Gravity, Gods, and Minds

In this book, a remarkable group of scientists, physicians, philosophers, and theologians share profound insights into our deepest questions, and the invisible forces and powerful beliefs that shape us. They will challenge you–and reward you with a richer understanding of who we are, what we share, and what it...

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Advanced Materials for Membrane Fabrication and Modification
Advanced Materials for Membrane Fabrication and Modification

Membranes are an energy efficient separation technology that are now the basis for many water treatment and food processing applications. However, there is the potential to improve the operating performance of these separations and to extend the application of membranes to energy production, gas separations, organic solvent-based...

Security Warrior
Security Warrior

This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy