 |
|
 CIL Programming: Under the Hood of .NETThis resource covers the essentials of programming the CIL, and discusses the basics of what .NET assemblies are and how manifests fit into the picture, as well as how to create assemblies in .NET.
- Shows how and why programmers “touch the metal” and program CIL directly
- Includes information on the
... |  |  Hacking Exposed: Network Security Secrets & Solutions, Third Edition"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."... |  |  Internet Core Protocols: The Definitive GuideFor network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.
This book assumes you have a working... |
|
|
|
 Automating Windows With PerlPerl is the perfect language for achieving Automation in Windows because it combines a painless Visual Basic style of coding with Perl's strength as a scripting language for process communications. The new multitasking and networking approaches with 32-bit Windows require a radical departure from previous programming techniques. This book,... |  |  |  |  Mobile Phone Programming: and its Application to Wireless NetworkingThe technology evolution has been once and for all beyond comparison during the past decade or two. Any of us can nowadays do numerous things with numerous devices to help in everyday life. This applies not least to mobile phones. If we compare the feature set of a mobile phone model in 1995 with the latest smartphone models the most visible... |
|
Result Page: 7 6 5 4 3 2 1 |