Flylib.com
How to Recover Unreadable CDs?
Previous page
Table of content
Next page
Chapter 1: CD Organization
Table 1.1: The format of Q-subchannel data
Table 1.2: Conventional notation for all possible types of errors
Chapter 2: Power of Reed-Solomon Codes
Table 2.1: Dividing bits into check bits and data bits
Table 2.2: Polynomials (left column) and powers of two corresponding to them (right column)
Chapter 4: Interfaces for Interaction with the Hardware
Table 4.1: Description of IOCTL commands of the standard CD-ROM driver (more detailed information is provided in Windows NT DDK)
Table 4.2: An example of a CDB which, being transmitted to a SCSI device, makes it read sector 0—69
Table 4.3: Main Sense Key values (error categories) and their descriptions
Table 4.4: Main ASC and ASCQ codes
Table 4.5: Interrelation between the type of requested data and the length of the returned sector
Table 4.6: The comparison of different methods of access ( undesired characteristics are highlighted)
Chapter 6: Anti-Copying Mechanisms
Table 6.1: The structure of a TDB terminating with one TDU
Previous page
Table of content
Next page
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (Uncovered series)
ISBN: 1931769338
EAN: 2147483647
Year: 2003
Pages: 60
Authors:
Kris Kaspersky
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Retrieving Stored Procedure Return Values Using a DataReader
Updating a Data Source with Data from a Different Data Source
Converting a DataReader to a DataSet
Enforcing Business Rules with Column Expressions
Creating a Table in the Database from a DataTable Schema
The Complete Cisco VPN Configuration Guide
VPNs: Choosing a Solution
ISAKMP/IKE Phase 2
Concentrator Remote Access Connections with IPsec
ISAKMP/IKE Phase 1 Preparation
Router ISAKMP/IKE Phase 1 Connectivity
Cisco IOS Cookbook (Cookbooks (OReilly))
Scheduling of Router Commands
Ensuring Proper Disconnection
Configuring Routing for a Low-Frequency Multicast Application
Route Redistribution
Tunneling IPv6 Through an Existing IPv4 Network
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 6. Make Route Maps Easier to Read
Hack 15. Zoom Right In on Your Neighborhood
Hack 25. Work with Multiple Lat/Long Formats
Hack 27. Calculate the Distance Between Points on the Earths Surface
Hack 65. Extract Data from Maps with Manifold
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
Comparing, Designing, and Deploying VPNs
Review Questions
Advantages and Disadvantages of MPLS Layer 3 VPNs
MPLS Layer 3 VPNs Overview
Deploying Site-to-Site IPsec VPNs
Review Questions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies