Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Guide To Chalcogen-nitrogen Chemistry
A Guide To Chalcogen-nitrogen Chemistry
The quintessential chalcogen-nitrogen compound tetrasulfur tetranitride, S4N4, was first detected by Gregory in 1835 just ten years after the discovery of benzene. Its unusual structure, like that of benzene, was not elucidated for over 100 years. The application of diffraction techniques revealed the unusual cage arrangement with two weak...
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Microsoft Windows XP Inside Out
Microsoft Windows XP Inside Out

Think you know Microsoft Windows inside out? Think again.

For more than a decade, power users have obsessed over ways to make Windows run faster, work smarter, and crash less often. Through books, magazine articles, and the Web, Windows users have amassed huge collections of keyboard shortcuts, registry hacks, elegant workarounds,...

Windows 7 Annoyances: Tips, Secrets, and Solutions
Windows 7 Annoyances: Tips, Secrets, and Solutions

They say no one should see how sausage or laws get made, and I feel the same
is true for software.

Imagine a windowless room in a nondescript office building. Inoffensive tan carpet lines the floors, fluorescent lights hum softly overhead, and 20 seated Microsoft employees flank a rectangular folding table in the center of...

Managing Information Security Risks: The OCTAVE Approach
Managing Information Security Risks: The OCTAVE Approach

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
RADIUS
RADIUS
RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS...
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
THE ROLE OF a user experience consultant, and specifi cally the user-centered design process, is to help guide and shape the development of products and services based on what the user understands and requires. To do this, the consultant needs to be a facilitator and communicator, ensuring that the right user information is...
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way

I cannot help but find striking resemblances between scientific communities and schools of fish. We interact in conferences and through articles, and we move together while a global trajectory emerges from individual contributions. Some of us like to be at the center of the school, others prefer to wander around, and a few swim in multiple...

DarkMarket: Cyberthieves, Cybercops and You
DarkMarket: Cyberthieves, Cybercops and You

"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." --Roberto Saviano, author of Gommorah

The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a
...

OS X Lion Made Simple
OS X Lion Made Simple

So you have your brand new Mac, or perhaps you've upgraded to Lion on an existing desktop or laptop. Now what? OS X Lion Made Simple will guide you through all of the new features of Lion, as well as provide a thorough tour of the features and applications that are OS X standards. You'll discover how to make the most of...

Beyond Photoshop: Advanced techniques integrating Photoshop with Illustrator, Poser, Painter, Cinema 4D and ZBrush
Beyond Photoshop: Advanced techniques integrating Photoshop with Illustrator, Poser, Painter, Cinema 4D and ZBrush

In his best-selling book Creative Photoshop, award-winning artist Derek Lea previously revealed to the digital art world his secrets for creating stunning, sophisticated works of art using Photoshop. Now, he goes one step further in this all-new book to demonstrate his unique methods for using Photoshop in conjunction with other software...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy