Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Processing and Security Systems
Information Processing and Security Systems

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in...

Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)

“If you’re writing a native Win32 program or just want to know what the OS is really doing underneath, you need John’s book. He covers the stuff that real systems programmers absolutely must know. Recommended.”

–Chris Sells, Microsoft Corporation

...
Developer's Guide to Microsoft Enterprise Library, Visual Basic Edition (Patterns & Practices)
Developer's Guide to Microsoft Enterprise Library, Visual Basic Edition (Patterns & Practices)

You are holding in your hands a book that will make your life as an enterprise developer a whole lot easier.

It’s a guide on Microsoft Enterprise Library and it’s meant to guide you through how to apply .NET for enterprise development. Enterprise Library, developed by the patterns & practices group, is a collection...

Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Windows Sysinternals Administrator's Reference
Windows Sysinternals Administrator's Reference

The Sysinternals Suite is a set of over 70 advanced diagnostic and troubleshooting utilities for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. Since Microsoft’s acquisition of Sysinternals in 2006, these utilities have been available for free download from...

Advances in Multimedia Information Processing - PCM 2005: 6th Pacific Rim Conference on Multimedia, Jeju Island, Korea, November 11-13, 2005
Advances in Multimedia Information Processing - PCM 2005: 6th Pacific Rim Conference on Multimedia, Jeju Island, Korea, November 11-13, 2005
We are delighted to welcome readers to the proceedings of the 6th Pacific-Rim Conference on Multimedia (PCM). The first PCM was held in Sydney, Australia, in 2000. Since then, it has been hosted successfully by Beijing, China, in 2001, Hsinchu, Taiwan, in 2002, Singapore in 2003, and Tokyo, Japan, in 2004, and finally Jeju, one...
Advanced FileMaker Pro 5.5: Techinques for Developers with CDR (Wordware FileMaker Library)
Advanced FileMaker Pro 5.5: Techinques for Developers with CDR (Wordware FileMaker Library)
We almost never read forewords or introductions, so we’ll try to be as brief as possible. There were several reasons for writing this book. As time has gone by and FileMaker has evolved into a more sophisticated development tool, the need for more advanced FileMaker reference materials has grown as well. We felt that while...
Wireshark® 101: Essential Skills for Network Analysis
Wireshark® 101: Essential Skills for Network Analysis

This book is written for beginner analysts and includes 46 step-by-step labs to walk you through many of the essential skills contained herein. This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Gitolite Essentials
Gitolite Essentials

Leverage powerful branch and user access control with Git for your own private collaborative repositories

Overview

  • Learn to manage the many repositories and the users accessing these repositories in the Git server
  • Walks you through the most important ideas and concepts in Gitolite supported...
Learn OS X Lion
Learn OS X Lion

You’re smart and savvy, but you're also busy. This comprehensive guide to Apple's latest version of OS X, Lion, gives you everything you need to know to live a happy, productive Mac life. Learn OS X Lion will have you up and connected right away. With a minimum of overhead and a maximum of useful information,...

Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking

Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...

unlimited object storage image
Result Page: 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy