Search Results - "source code"

Refine Results
  1. 1
  2. 2

    Applied cryptography protocols, algorithms, and source code in C by Schneier, Bruce 1963

    Published 2015
    Book
  3. 3

    Applied cryptoography second edition protocols, algorithms and source code in C by Schneier

    Published 1996
    Book
  4. 4
  5. 5
  6. 6

    Building intelligent databases with Oracle PL/SQL, triggers, and stored procedure by Owens, Kevin T.

    Published 1996
    Book
  7. 7

    3D game engine programming by Zerbst, Stefan

    Published 2004
    Book
  8. 8

    Adaptive design theory and implementation using SAS and R by Chang, Mark

    Published 2008
    Book
  9. 9

    Hacking exposed wireless wireless security secrets & solutions by Cache, Johnny

    Published 2010
    Book
  10. 10

    Simulational sensation with C++ by Kumar, Vivek

    Published 2011
    Book
  11. 11
  12. 12

    The web application hacker's handbook finding and exploiting security flaws by Stuttard, Dafydd 1972-, Pinto, Marcus 1978-

    Published 2011
    Table of Contents: “…. -- Attacking application logic -- Attacking other users -- Automating bespoke attacks -- Exploiting information disclosure -- Attacking compiled applications -- Attacking application architecture -- Attacking the Web server -- Finding vulnerabilities in source code -- A Web application hacker's toolkit -- A Web application hacker's methodology…”
    Book
  13. 13

    Computer networks an open source approach by Lin, Ying-Dar

    Published 2012
    Book
  14. 14

    Electrical engineering in context smart devices, robots & communications by Kuc, Roman

    Published 2015
    Table of Contents: “…Sequential Logic Circuits.12. Source Coding.13. Channel Coding.14. Symbology.15. Data Networks.16. …”
    Book
  15. 15

    Empirical research in software engineering concepts, analysis, and applications by Malhotra, Ruchika

    Published 2016
    Book
  16. 16

    The art and science of analyzing software data

    Published 2015
    Book
  17. 17

    Anti-hacker tool kit by Shema, Mike

    Published 2014
    Table of Contents: “…The Best of the Basics -- 1. Managing Source Code and Working with Programming Languages -- 2. …”
    Book
  18. 18

    Identity and access management business performance through connected intelligence by Osmanoglu, Ertem

    Published 2013
    Book
  19. 19

    Linux for embedded and real-time applications by Abbott, Doug

    Published 2013
    Table of Contents: “…Preface -- Part 1: Introduction and getting started -- Chapter 1: The embeddah and real-time space -- Chapter 2: Installing linux -- Chapter 3: Introducing linux -- Chapter 4: The host development environment -- Chapter 5: The hardware -- Chapter 6: Eclipse integrated development environment -- Part 2: Application programming in a cross-development environment -- Chapter 7: Accessing hardware from user space -- Chapter 8: Debugging embedded software -- Chapter 9: Posix threads -- Chapter 10: Embedded networking -- Chapter 11: Configuring and building the kernel -- Chapter 12:Kernel modules and device drivers -- Part 3: Components and tools -- Chapter 13: Busybox and linux initialization -- Chapter 14: Boot boot loader and getting ready to ship -- Chapter 15: Source code control-GIT -- Chapter 16: Build tools.…”
    Book
  20. 20

    Linux for embedded and real-time applications by Abbott, Doug

    Published 2013
    Table of Contents: “…Preface -- Part 1: Introduction and getting started -- Chapter 1: The embeddah and real-time space -- Chapter 2: Installing linux -- Chapter 3: Introducing linux -- Chapter 4: The host development environment -- Chapter 5: The hardware -- Chapter 6: Eclipse integrated development environment -- Part 2: Application programming in a cross-development environment -- Chapter 7: Accessing hardware from user space -- Chapter 8: Debugging embedded software -- Chapter 9: Posix threads -- Chapter 10: Embedded networking -- Chapter 11: Configuring and building the kernel -- Chapter 12:Kernel modules and device drivers -- Part 3: Components and tools -- Chapter 13: Busybox and linux initialization -- Chapter 14: Boot boot loader and getting ready to ship -- Chapter 15: Source code control-GIT -- Chapter 16: Build tools.…”
    Book