 |
|
 CD Cracking Uncovered: Protection Against Unsanctioned CD CopyingA manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver... |  |  Microsoft Windows XP Inside OutThink you know Microsoft Windows inside out? Think again.
For more than a decade, power users have obsessed over ways to make Windows run faster, work smarter, and crash less often. Through books, magazine articles, and the Web, Windows users have amassed huge collections of keyboard shortcuts, registry hacks, elegant workarounds,... |  |  Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... |
|
 Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... |  |  19 Deadly Sins of Software Security (Security One-off)This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man... |  |  |
|
 |  |  The IOMA Handbook of Logistics and Inventory ManagementPractical, easy-to-implement advice on the most successful logistics management techniques being used today--from selecting the best carriers, setting logistics performance goals, and planning logistics strategies, to streamlining shipping and receiving and slashing logistics costs, and negotiating and managing third party logistics service... |  |  Biometrics, Computer Security Systems and Artificial Intelligence ApplicationsThis book presents the most recent achievements in the field of a very fast developing Computer Science. It is a very fascinating science, which still encompasses a number of uncovered areas of study with urgent problems to be solved. Therefore, thousands of scientists are dealing with it elaborating on more and more practical and efficient... |
|
 |  |  |  |  A Guide To Chalcogen-nitrogen ChemistryThe quintessential chalcogen-nitrogen compound tetrasulfur tetranitride, S4N4, was first detected by Gregory in 1835 just ten years after the discovery of benzene. Its unusual structure, like that of benzene, was not elucidated for over 100 years. The application of diffraction techniques revealed the unusual cage arrangement with two weak... |
|
| Result Page: 6 5 4 3 2 1 |