Home | Amazing | Today | Tags | Publishers | Years | Search 
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

Hacking Movable Type (ExtremeTech)
Hacking Movable Type (ExtremeTech)
Ready to push Movable Type to the max?

Movable Type, that amazingly powerful personal publishing application, is the superhero of the Internet age. But when you push, poke, stretch, and otherwise coax it into producing even more, the possibilities for your Web content are simply superlative. Roll up your sleeves and get moving—here's the...

An Introduction to TTCN-3
An Introduction to TTCN-3
An Introduction to TTCN-3 is the perfect companion to the available TTCN-3 language standards.

The third revision of TTCN combines the best parts of previous versions with a powerful new textual syntax to create a universal testing language, whose application has been widened beyond communication systems to areas...

Digital Synthesizers and Transmitters for Software Radio
Digital Synthesizers and Transmitters for Software Radio
The approach adopted in this book will, it is hoped, provide an understanding
of key areas in the field of digital synthesizers and transmitters. It is easy
to include different digital techniques in the digital synthesizers and transmitters
by using digital signal processing methods, because the signal is in
digital form. By
...
Beginning XSLT 2.0: From Novice to Professional
Beginning XSLT 2.0: From Novice to Professional
Welcome to Beginning XSLT 2.0, a comprehensive introduction to the Extensible Stylesheet
Language: Transformations 2.0. This book introduces you to transforming XML with XSLT 2.0,
helping you to create tailored presentations for all the information you have accessible as XML.
I wrote this book, like Beginning XSLT, based on my own
...
Pro Novell Open Enterprise Server
Pro Novell Open Enterprise Server
This book is about Novell Open Enterprise Server. With Open Enterprise Server, Novell launched a new generation of server operating system, following a 20-year long tradition with NetWare. Open Enterprise Server is unique in the industry due to its two versions: one for Linux and another for NetWare. This book is meant as a guide to Open Enterprise...
Artificial Life Models in Software
Artificial Life Models in Software

This book presents software tools, environments and realities dealing with creation, imitation and analysis of artefactual, virtual, and living forms, written by those who personally design and produce software, hardware, and art installations in artificial life, simulated complex systems, and virtual worlds.

This timely volume offers a...

Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
This edited book contains articles accepted for presentation during the conference "Intelligent Information Systems 2005 (IIS 2005) - New Trends in Intelligent Information Processing and Web Mining" held in Gdansk, Poland, on June 13-16, 2005. Special attention is devoted to the newest developments in the areas of Artificial Immune...
Beginning Mac OS X Programming
Beginning Mac OS X Programming

Beginning Mac OS X Programming

Every Mac OS X system comes with all the essentials required for programming: free development tools, resources, and utilities. However, finding the place to begin may be challenging, especially if you have no prior development knowledge. This comprehensive guide offers you an ideal starting point to...

Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Mechanics of Composite Materials with MATLAB
Mechanics of Composite Materials with MATLAB

This is a book for people who love mechanics of composite materials and ? MATLAB . We will use the popular computer package MATLAB as a matrix calculator for doing the numerical calculations needed in mechanics of c- posite materials. In particular, the steps of the mechanical calculations will be emphasized in this book. The reader will not...

Result Page: Previous 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy