Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Assembly Language Primer for the IBM PC (Plume Computer Books)

Buy

Explains how assembly language works, discusses sound generation, memory segmentation, color graphics, and language interfaces, and shows how to write programs in assembly language

(HTML tags aren't allowed.)

Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)
Your Code as a Crime Scene: Use Forensic Techniques to Arrest Defects, Bottlenecks, and Bad Design in Your Programs (The Pragmatic Programmers)

Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book...

RF & Wireless Technologies (Newnes Know It All)
RF & Wireless Technologies (Newnes Know It All)
RF & wireless technology enables laptops, cell phones, portable video games and much more - engineers can "Know It All with Newnes!"

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key
...
SAP Transaction Codes: Frequently Used T-Codes
SAP Transaction Codes: Frequently Used T-Codes

SAPTransaction Codes: Frequently Used T-Codes is a reference book, which will be a handy tool for those using the SAP business software. It can be used by casual end users, power/super users, subject matter experts (SMEs) implementation project team members, as well application support staff.

...

Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Adobe InDesign CS4 Styles: How to Create Better, Faster Text and Layouts
Adobe InDesign CS4 Styles: How to Create Better, Faster Text and Layouts

Tap into the far-reaching potential of InDesign styles—from simple drop cap formatting to cross-media export to XHTML. Styles have the power to transform how design and production professionals approach and accomplish any project. Adopting a style-centric workflow can reduce tasks that would normally take days to mere hours, and tasks...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy