Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so...

Developer to Designer: GUI Design for the Busy Developer
Developer to Designer: GUI Design for the Busy Developer
In a fantasy world, you design and build the core of your application, the parts that do all the heavy lifting. And the graphical user interface? Well, that’s the domain of the hot-shot sitting one cube over, who went to school to learn how to give users sensible and effective control over the functionality you construct....
SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Designing Interfaces
Designing Interfaces

Designing a good interface isn't easy. Users demand software that is well-behaved, good-looking, and easy to use. Your clients or managers demand originality and a short time to market. Your UI technology -- web applications, desktop software, even mobile devices -- may give you the tools you need, but little guidance on how to use them...

Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Advanced Electrical Installation Work, Fourth Edition
Advanced Electrical Installation Work, Fourth Edition

Advanced Electrical Installation Work has helped thousands of students to achieve success in City & Guilds awards in electrical installation. Now in its fourth edition, this book has been completely restructured to provide a specific match to the requirements of the Installation route of the 2330 Level 3...

Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs
Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs

The first two editions of Effective C++ were embraced by hundreds of thousands of programmers worldwide. The reason is clear: Scott Meyers' practical approach to C++ describes the rules of thumb used by the experts—the things they almost always do or almost always avoid doing—to produce clear, correct, efficient code.The book...

Programming Windows Presentation Foundation
Programming Windows Presentation Foundation

Windows Presentation Foundation (WPF) (formerly known by its code name "Avalon") is a brand-new presentation framework for Windows XP and Windows Vista, the next version of the Windows client operating system. For developers, WPF is a cornucopia of new technologies, including a new graphics engine that supports 3-D...

Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
Firefox Hacks
Firefox Hacks

Firefox Hacks is ideal for power users who want to maximize the effectiveness of Firefox, the next-generation web browser that is quickly gaining in popularity. This highly-focused book offers all the valuable tips and tools you need to enjoy a superior and safer browsing experience. Learn how...

Starting Out with C++: Early Objects (Formerly Alternate Edition) (5th Edition)
Starting Out with C++: Early Objects (Formerly Alternate Edition) (5th Edition)
There is a strong emphasis on problem solving and program design teaching C++ in a slower-paced stepped out fashion.   Clear, and easy-to-understand writing style covering core introductory programming topics including inheritance, polymorphism and advanced data structure topics. Classes are...
unlimited object storage image
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy