Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking the Xbox: An Introduction to Reverse Engineering
Hacking the Xbox: An Introduction to Reverse Engineering
This--this being the attitude encapsulated in Andrew "bunnie" Huang's Hacking the Xbox--is why a lot of people got into the computer industry in the first place. These people liked taking things apart and figuring out how they worked, then making them serve purposes they weren't originally designed for and sharing the new discoveries with...
The Official GNOME 2 Developer's Guide
The Official GNOME 2 Developer's Guide
Developers who write programs for GNOME use the GNOME API. Working with the GNOME API is preferable because the program will conform to the standard GNOME program look and feel. It also allows the developer to use the GNOME specific libraries in the program, greatly simplifying the development process. GNOME 2.0 is the official GNOME Foundation...
The Linux Cookbook, Second Edition
The Linux Cookbook, Second Edition
The Linux Cookbook, 2nd Edition is your guide to getting the most out of Linux. Organized by general task (such as working with text, managing files, and manipulating graphics), each section contains a series of step-by-step recipes that help you to get your work done quickly and efficiently, most often from the command line. Nearly 50...
Linux for Non-Geeks: A Hands-On, Project-Based, Take-It-Slow Guidebook
Linux for Non-Geeks: A Hands-On, Project-Based, Take-It-Slow Guidebook

This resource is for those who have switched or will be switching to Linux; it avoids tech-talk, but focuses on subjects appealing to the average Joe--installation, playing CDs, the Internet, games, printing, and more.


This book is for any home user who has switched or is thinking of switching to Linux. Based on Red Hat's...

How Linux Works
How Linux Works

Whether you're a systems administrator or a home user, you need to understand how Linux internals work before you can really master Linux-how it boots, how networking works, how to customize the kernel, and even what hardware to buy.

How Linux Works contains the kind of information normally handed down from
...

Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software

The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer network, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable business system for a small business...

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Cisco Routers for the Desperate: Router Management, The Easy Way
Cisco Routers for the Desperate: Router Management, The Easy Way
Cisco routers are the standard devices used to connect companies to the Internet. They are highly reliable and robust, and support anything from small connections to huge circuits used by telephone companies. Cisco Routers for the Desperate is a brief, meaty introduction to Cisco routers that will make a competent systems administrator...
Steal This File Sharing Book
Steal This File Sharing Book

Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song...

Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
Write Portable Code: An Introduction to Developing Software for Multiple Platforms
Write Portable Code: An Introduction to Developing Software for Multiple Platforms
Tech Republic, August 4, 2005
This sample chapter examines the issues you'll run into when moving code between processor architectures.

GBGames’ Blog, July 21, 2005
Within the first few chapters, I’ve already learned about a new tool.

...
Result Page: Previous 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy