Home | Amazing | Today | Tags | Publishers | Years | Search 
IBM Certification Study Guide AIX Installation and System Recovery
IBM Certification Study Guide AIX Installation and System Recovery
The AIX and RS/6000 Certifications, offered through the Professional Certification Program from IBM, are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of the AIX operating system and RS/6000 and pSeries servers. A complete set of professional certifications are...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Windows 2000 Commands Pocket Reference
Windows 2000 Commands Pocket Reference
This desktop reference documents Windows 2000 command mode. It is designed for system administrators, but will also prove beneficial to many other types of users. It includes most available Windows 2000 commands, as well as the most useful system administration command-line utilities from the Resource Kit (space permitting). Resource Kit commands...
Practical C Programming, 3rd Edition
Practical C Programming, 3rd Edition
This book is devoted to practical C programming. C is currently the premier language for software developers. That's because it's widely distributed and standard. Newer languages are available, such as C++, but these are still evolving. C is still the language of choice for robust, portable programming.

This book emphasizes the skills
...
Sams Teach Yourself SQL in 24 Hours (3rd Edition)
Sams Teach Yourself SQL in 24 Hours (3rd Edition)

Sams Teach Yourself SQL in 24 Hours, Third Edition presents the key features of SQL (Structured Query Language) in an easy to understand format with updated code examples, notes, diagrams, exercises, and quizzes. New material covers more information on transactions, constructs, embedded databases, and object-oriented programming. In this...

C Primer Plus (4th Edition)
C Primer Plus (4th Edition)

As with all the editions, author Stephen Prata's aim has been to create an introduction to C that is instructive, clear, and helpful. Programming concepts are explained along with details of the C language; the book does not assume that you are a professional programmer. Many short, easily typed examples illustrate just one or two concepts at a...

Parallel and Distributed Programming Using C++
Parallel and Distributed Programming Using C++

Parallel and Distributed Programming Using C++ provides an up-close look at how to build software that can take advantage of multiprocessor computers. Simple approaches for programming parallel virtual machines are presented, and the basics of cluster application development are...

Embedded Systems Firmware Demystified (With CD-ROM)
Embedded Systems Firmware Demystified (With CD-ROM)

Build embedded microprocessor-based systems from the ground up. Develop an integrated understanding of hardware and software issues by exploring the interaction of the firmware and hardware during the first critical few seconds after the microprocessor is powered up. By focusing on these crucial junctures, where software meets hardware, you...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy