Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike...
SQL for MySQL Developers: A Comprehensive Tutorial and Reference
SQL for MySQL Developers: A Comprehensive Tutorial and Reference
The Most Complete and Practical Guide to MySQL Version 5’s Powerful SQL Dialect

 

MySQL version 5 offers a SQL dialect with immense power. In SQL for MySQL Developers, Rick F. van der Lans helps you master this version ofSQL and take advantage of its full...

Core Internet Application Development with ASP.NET 2.0 (Core Series)
Core Internet Application Development with ASP.NET 2.0 (Core Series)
The Comprehensive Guide to ASP.NET 2.0 for Experienced Developers

ASP.NET 2.0 represents a true breakthrough in Web development technology and delivers unprecedented power, flexibility, and efficiency. If you’re an experienced programmer who wants to build production-quality Web applications and services with ASP.NET 2.0, this book is the...

Outlook 2007 For Dummies (Computer/Tech)
Outlook 2007 For Dummies (Computer/Tech)
Make scheduling and e-mail more efficient with Outlook

Control your contacts, connect to podcasts and blogs, and team up with others

Outlook is a powerhouse for managing that mountain of e-mail, but do you know all the other things it can do? This book walks you through the cool...

Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)
Live Linux(R) CDs: Building and Customizing Bootables (Negus Live Linux Series)

Dream the perfect computer system, then build it to run on a Linux live CD!


A Linux live CD is more than just a Linux system you carry around. Start with...

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Sensors Applications, Volume 2
Sensors Applications, Volume 2
Taken as a whole, this series covers all major fields of application for commercial sensors, as well as their manufacturing techniques and major types. As such the series does not treat bulk sensors, but rather places strong emphasis on microsensors, microsystems and integrated electronic sensor packages. Each of the individual volumes is tailored...
Beginning Excel Services (Programmer to Programmer)
Beginning Excel Services (Programmer to Programmer)
Given the prominent role Excel plays in today's companies, the need for users to better manage, distribute, and incorporate spreadsheets in larger applications is greater than ever. Written by Microsoft's lead developers of Excel Services, this book shares their insights into the benefits and usage of Excel's new server technology so that you can...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Microsoft .NET Framework Professional Projects
Microsoft .NET Framework Professional Projects
Use .NET Framework to accomplish real-world, professional tasks. .NET Framework Professional Projects is your key to unlocking the power of .NET Framework. Each project focuses on a specific concept and is based on a real-world situation. Enhance your skills as you work through eleven projects including creating XML schemas, creating a Web service...
Alan Simpson's Windows Vista Bible, Desktop Edition
Alan Simpson's Windows Vista Bible, Desktop Edition
The best of Windows Vista in a handy desktop size

Make Windows Vista your own with this convenient reference drawn from the very best of bestselling author Alan Simpson's Alan Simpson's Windows Vista Bible. Master the basics of PCs and operating systems, get started on Vista, and move ahead to multimedia, adding...

Result Page: 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy