Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First
The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First
Takes the reader inside the often bizarre world of the Earth First! Movement and the back to nature counterculture of California's North Coast.

Kate Coleman traces Judi Bari's rise from college activist to would-be Mother Jones of the Redwoods. Drawing on extensive interviews with Bari's friends and comrades as well as critics, Coleman
...
Vault Guide to Finance Interviews, 6th Edition
Vault Guide to Finance Interviews, 6th Edition
Money makes the world go round, and those in charge of money are the financiers. Have thirst for relevance? The finance industry has always been a competitive field, due in large part to the glamour and prestige assigned to the working relationships with industry titans. Of course, the outstanding salaries explain much of the pull as well. (Unless...
Progress on Cryptography: 25 Years of Cryptography in China
Progress on Cryptography: 25 Years of Cryptography in China
This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last...
The Success of Open Source
The Success of Open Source

Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...

Where Winners Live: Sell More, Earn More, Achieve More Through Personal Accountability
Where Winners Live: Sell More, Earn More, Achieve More Through Personal Accountability

Be accountable and achieve success

Personal accountability is the secret weapon of every successful sales professional. It is the secret weapon of Where Winners Live co-author Dave Porter, who became the owner and CEO of Baystate Financial Services at age 35 and grew it into a $100 million-a-year business over the next 15...

Hacking GPS (ExtremeTech)
Hacking GPS (ExtremeTech)
You'll get lost in this book, but nowhere else

Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Inventor's Guide to Law, Business & Taxes
Inventor's Guide to Law, Business & Taxes
Hungry for cash, John "Doc" Pemberton sold the world's most famous trade secret -- the formula for Coca-Cola, for less than $900. Charles Goodyear had a brilliant innovation -- rubber that could be used year-round. But Goodyear made many bad deals, failed to protect his patent rights and died in 1860 owing over...
America's Secret Establishment: An Introduction to the Order of Skull & Bones
America's Secret Establishment: An Introduction to the Order of Skull & Bones
The book began with an anonymous donation to the author of an 8-inch package of documents in the early 1980s. Nothing less than the membership list and supporting documents for a truly secret society the Yale Skull and Bones.

The late Johnny Johnson, of Phoenix Arizona was the spark that moved me to write first a
...
Creating Mobile Apps with jQuery Mobile
Creating Mobile Apps with jQuery Mobile

By the time you've completed the 10 projects in this book, you'll be a dab hand at using jQuery Mobile to create apps for smartphones and tablets. Turn your basic web development knowledge into pure gold.

Overview

  • Write less, do more: learn to apply the jQuery motto to quickly craft creative sites...
The Photoshop CS2 Book for Digital Photographers (Voices That Matter)
The Photoshop CS2 Book for Digital Photographers (Voices That Matter)
Scott Kelby, the best-selling Photoshop author in the world today, once again takes this book to a whole new level as he uncovers the latest, most important and most exciting new Adobe Photoshop CS2 techniques for digital photographers.This major update to this award-winning, record-breaking book does something for digital photographers that's...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy