Blog post-passing gold autumn new book big release (2) Safety Technology Large Series & Java Large

xiaoxiao2021-03-06  54

Safety Technology Master's series of books steps from October, which is about to be launched, has reached 8 sizes, and the "software encryption technology insider" and earlier "encryption and decryption", "data in July. Restore technology can also be attributed to this series of categories. It is worth mentioning that in this series, there have been three Chinese copyrights that have been three Chinese books sold during the Beijing International Book Exhibition at the beginning of the month. Below is an introduction to this series. 1. Code optimization: Effective use of memory (new, focus) (copyright output) Code Optimization: Effective Memory Usage features: The copyright has just been output to Taiwan, which is a top version that is comparable to programmer's practice. [United States] Kris Kaspersky, Kris Kaspersky is a column writer for hacker deciphering, disassembly and code optimization technology. He has been committed to studying problems in safety and system programming, covering compiler development, optimization technology, security mechanism research, real-time operating system kernel creation, and designs such as anti-virus programs. Pricing: 48.00 yuan (including CD) Page: 348 Open: Short 16 open (185 * 235) on the shelf time: October 2004 2. Hacker anti-excitement might secret (new, focus) HACKER Disassembling Uncovered Features: The copyright has just been output to Taiwan, as "code optimization: effective use of memory", is a famous masterpiece of Kris Kaspersky. This book is divided into two parts. The first part combines the well-selected examples, systematically discusses hacker code analysis technology, including the use of typical analysis tools such as anti-poliglers, and the basic process of code analysis, and related troubleshooting processing. The second part introduces the various challenges faced by program protection and its related anti-stamping, anti-tracking, anti-counter-off encryption and decryption technology, etc., actually a high-level topic of code analysis. The book is targeted, practical and comprehensive organically, well - satisfied with the needs of learning code analysis technology. The book is mainly to prevent hackers from invading or engage in security program developers for computer security maintenance. At the same time, this book also has a good reference value for computer core knowledge such as learning programs and operating systems. Pricing: 59.00 yuan Page: 552 Open: Short 16 open (185 * 235) on the shelf time: October 2004 3. Microsoft, UNIX and Oracle host and network security (focus) Content features: This is the safety department A book is a very wide book because the domestic server is basically Microsoft, UNIX Oracle architecture. So this book is a book suitable for the majority of network management learning reference. Host and NetWork Secursy for Microsoft, Unx and Oracle [Beauty] Erik Pace Birkholz, Foundstone, Zhao Yanling, Pan Ji, Dong Chunhong, etc. OK: Short 16 open 4. Haike attack and defense actual battle entry Dunji edited publication time: June 2004 Book: ISBN 7-120-00068-3 Pricing: 38.00 yuan Page: 402 Open: Short 16 open 5. Software encryption principle and application Features: Selected, analyzed and cracking examples, perspective decryption mentality, and compute the thinking methods of software protection and cracking.

转载请注明原文地址:https://www.9cbs.com/read-114250.html

New Post(0)