Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 3406

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key Features Analyze and improvise software and hardware with real-world examples Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2. Explore modern security techniques to identify, exploit, and avoid cyber threats Book... more...

Containing exercises and materials that engage students at all levels, Discrete Mathematics with Ducks presents a gentle introduction for students who find the proofs and abstractions of mathematics challenging. This classroom-tested text uses discrete mathematics as the context for introducing proofwriting. Facilitating effective and active learning, each chapter contains a mixture of discovery activities, expository text, in-class... more...

Inside your computer are several smaller ones, which must work together for best performance. Getting them to do this, rather than pulling against each other, can make quite a difference to how your machine behaves, but most come out of their boxes inadequately set up because there isn't enough time or incentive for the manufacturers to do it for you - they mostly choose standard CMOS settings to suit the widest circumstances (and keep BIOS problems to... more...

Chances are that if you work with Windows computers you've used Windows Command Line. You may even have run commands at the command prompt. However, you probably still have many questions about Windows Command Line and may also wonder what tools and resources are available. This practical hands-on guide for Windows power users and IT professionals delivers ready answers for using Windows command-line tools to manage Windows 8.1,... more...

Without formal, verifiable software requirements—and an effective system for managing them—the programs that developers think they’ve agreed to build often will not be the same products their customers are expecting. In SOFTWARE REQUIREMENTS, Second Edition, requirements engineering authority Karl Wiegers amplifies the best practices presented in his original award-winning text?now a mainstay for anyone... more...


Web Dynpro ABAP, a NetWeaver web application user interface tool of SAP enables web programming connected to SAP Systems. The main focus of the authors was to create a book based on practical experience. Each chapter includes examples which lead through the content step-by-step and enable the reader to gradually emerge in the topic of the Web Dynpro ABAP process. The authors explain in particular how to design a Web Dynpro component, the data binding... more...

Exiting Mastering Vim Quickly One of the beautiful things about learning Vim is the fact that you don't need to know everything. You only need to understand a few critically important concepts that provide most of the value. If you invest the time and energy necessary to learn these concepts, you'll easily be in the top 1% of the human population when it comes to productivity in coding/programming/text editing. Instead of... more...

An Atlas Of Edge-Reversal Dynamics is the first in-depth account of the graph dynamics system SER (Scheduling by Edge Reversal), a powerful distributed mechanism for scheduling agents in a computer system. The study of SER draws on strong motivation from several areas of application, and reveals very clearly the emergence of complex dynamic behavior from very simple transition rules. As such, SER provides the opportunity for the study of complex graph... more...

This book is written in cookbook style and it offers learning through recipes with examples and illustrations. Each recipe contains step-by-step instructions about everything necessary to execute a particular task. The book is designed so that you can read it from start to end for beginner's or just open up any chapter and start following the recipes as a reference for advanced users. If you are a beginner or an intermediate user who wants to master... more...

This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it delves into theoretical aspects of LDAP, but only where understanding the theory helps to answer practical... more...