Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

QoS and QoE Management in UMTS Cellular Systems
QoS and QoE Management in UMTS Cellular Systems
This comprehensive volume provides state-of-the art guidance on Quality of Service (QoS) and Quality of end-user Experience (QoE) management in UMTS cellular systems, tackling planning, provisioning, monitoring and optimisation issues in a single accessible resource. In addition, a detailed discussion is provided on service applications, QoS...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Professional Team Foundation Server
Professional Team Foundation Server

This book is for project managers, IT administrators, and anyone whose role consists of administering Team Foundation Server on a daily basis, running a software project, setting up users, or handling security.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of...

Software Testing and Analysis: Process, Principles and Techniques
Software Testing and Analysis: Process, Principles and Techniques
The first comprehensive book on software test and analysis

You can't “test quality into” a software product, but neither can you build a quality software product without test and analysis.  Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in...

The Complete Idiot's Guide to PCs (8th Edition)
The Complete Idiot's Guide to PCs (8th Edition)
As more and more people purchase computers for their home, the need for an easy-to-use, light-hearted guide becomes a necessity. Updated from the best-selling first edition, this must-have resource will provide readers with all the information they need from purchasing, setting up, upgrading their system and using the Internet to creating...
Teach Yourself VISUALLY MacBook (Tech)
Teach Yourself VISUALLY MacBook (Tech)
Teach Yourself Visually

Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 160 MacBook tasks. Each task-based...

Programming in Objective-C 2.0 (2nd Edition) (Developer's Library)
Programming in Objective-C 2.0 (2nd Edition) (Developer's Library)

 

From the author of Programming in C,Programming in Objective-C 2.0 provides the new programmer a complete, step-by-step introduction to the Objective-C language. The book does not assume previous experience with either C or object-oriented programming...

The Well-Grounded Rubyist
The Well-Grounded Rubyist
The Well-Grounded Rubyist takes you from interested novice to proficient practitioner. It's a beautifully written tutorial that begins with the basic steps to get your first Ruby program up and running and goes on to explore sophisticated topics like callable objects, reflection, and threading. Whether the topic is simple or tough, the...
Beginning Linux Programming (Linux Programming Series)
Beginning Linux Programming (Linux Programming Series)
Provided you have some previous basic exposure to C and Unix, Beginning Linux Programming delivers an excellent overview of the world of Linux development with an appealing range of essential tools and APIs.

The standout feature of Beginning Linux Programming is its wide-ranging coverage of important topics in basic Unix...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
unlimited object storage image
Result Page: 684 683 682 681 680 679 678 677 676 675 674 673 672 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy