Stealing the Network: How to Own an Identity The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the...
Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer) Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -... How to Do Everything with Your iMac, 4th Edition
The original idea of How to Do Everything with Your iMac was a simple one. The iMac is a complete computer with a wonderful bundle of applications that enable you to do just about anything you need a computer to do. So, I wanted my book on the iMac to be as comprehensive as possible, teaching the reader how to be productive while enjoying...
|Result Page: 11 10 9 8 7 6 5 4 3 2 |