Home | Amazing | Today | Tags | Publishers | Years | Search 
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Microsoft Windows XP Inside Out
Microsoft Windows XP Inside Out

Think you know Microsoft Windows inside out? Think again.

For more than a decade, power users have obsessed over ways to make Windows run faster, work smarter, and crash less often. Through books, magazine articles, and the Web, Windows users have amassed huge collections of keyboard shortcuts, registry hacks, elegant workarounds,...

Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
Beyond Programming: To a New Era of Design (Johns Hopkins University/Applied Physics Laboratory Series in Science and Engineering)
Beyond Programming: To a New Era of Design (Johns Hopkins University/Applied Physics Laboratory Series in Science and Engineering)
This book provides a unique examination of the software development process, arguing that discipline, still dominated by methods conceived in the framework of older technologies, must undergo a fundatmental reexamination of its guiding principles in order for significant progress to take place. To gain fresh insights into how we ought to direct...
The IOMA Handbook of Logistics and Inventory Management
The IOMA Handbook of Logistics and Inventory Management
Practical, easy-to-implement advice on the most successful logistics management techniques being used today--from selecting the best carriers, setting logistics performance goals, and planning logistics strategies, to streamlining shipping and receiving and slashing logistics costs, and negotiating and managing third party logistics service...
Biometrics, Computer Security Systems and Artificial Intelligence Applications
Biometrics, Computer Security Systems and Artificial Intelligence Applications
This book presents the most recent achievements in the field of a very fast developing Computer Science. It is a very fascinating science, which still encompasses a number of uncovered areas of study with urgent problems to be solved. Therefore, thousands of scientists are dealing with it elaborating on more and more practical and efficient...
Create Your Own Hedge Fund: Increase Profits and Reduce Risks with ETFs and Options (Wiley Trading)
Create Your Own Hedge Fund: Increase Profits and Reduce Risks with ETFs and Options (Wiley Trading)

"Options writing made simple for the layman."
—James Altucher, author of Trade Like a Hedge Fund

"One of the clearest explanations of how to use options as they were originally intended: as a component of an overall strategy in conjunction with other positions."
—Robert V. Green,
...

The Mental Health Professional and the New Technologies: A Handbook for Practice Today
The Mental Health Professional and the New Technologies: A Handbook for Practice Today
Technology, used for both informational and telecommunication purposes, is becoming one of the most important factors in the future of health care delivery. One can see the oncoming change simply by surfing the Internet and looking at the proliferation of health-related Web sites. The 7 million Web sites uncovered by the Alta Vista search engine...
A Guide To Chalcogen-nitrogen Chemistry
A Guide To Chalcogen-nitrogen Chemistry
The quintessential chalcogen-nitrogen compound tetrasulfur tetranitride, S4N4, was first detected by Gregory in 1835 just ten years after the discovery of benzene. Its unusual structure, like that of benzene, was not elucidated for over 100 years. The application of diffraction techniques revealed the unusual cage arrangement with two weak...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy