|
|
|
|
Game Hacking: Developing Autonomous Bots for Online Games
You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.
Bring your knowledge of Windows-based development and memory management, and Game... | | Learning Linux Binary Analysis
Key Features
-
Grasp the intricacies of the ELF binary format of UNIX and Linux
-
Design tools for reverse engineering and binary forensic analysis
-
Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Book Description
Learning... | | Application of Nanotechnology in Water Research
Details the water research applications of nanotechnology in various areas including environmental science, remediation, membranes, nanomaterials, and water treatment
At the nano size, materials often take on unique and sometimes unexpected properties that result in them being ‘tuned’ to build faster, lighter,... |
|
| | Visual Modeling with Rational Rose 2000 and UMLThe Unified Modeling Language (UML) offers standard semantics and notation for describing object structure and behavior and has emerged as the design medium of choice for developing large-scale distributed object applications. Augmented by the Rational Unified Process, an extensive set of software development guidelines, and the Rational Rose... | | |
|
| | Invisible Forces and Powerful Beliefs: Gravity, Gods, and Minds
In this book, a remarkable group of scientists, physicians, philosophers, and theologians share profound insights into our deepest questions, and the invisible forces and powerful beliefs that shape us. They will challenge you–and reward you with a richer understanding of who we are, what we share, and what it... | | Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |