Flylib.com
How to Recover Unreadable CDs?
Previous page
Table of content
Next page
Chapter 1: CD Organization
Table 1.1: The format of Q-subchannel data
Table 1.2: Conventional notation for all possible types of errors
Chapter 2: Power of Reed-Solomon Codes
Table 2.1: Dividing bits into check bits and data bits
Table 2.2: Polynomials (left column) and powers of two corresponding to them (right column)
Chapter 4: Interfaces for Interaction with the Hardware
Table 4.1: Description of IOCTL commands of the standard CD-ROM driver (more detailed information is provided in Windows NT DDK)
Table 4.2: An example of a CDB which, being transmitted to a SCSI device, makes it read sector 0—69
Table 4.3: Main Sense Key values (error categories) and their descriptions
Table 4.4: Main ASC and ASCQ codes
Table 4.5: Interrelation between the type of requested data and the length of the returned sector
Table 4.6: The comparison of different methods of access ( undesired characteristics are highlighted)
Chapter 6: Anti-Copying Mechanisms
Table 6.1: The structure of a TDB terminating with one TDU
Previous page
Table of content
Next page
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (Uncovered series)
ISBN: 1931769338
EAN: 2147483647
Year: 2003
Pages: 60
Authors:
Kris Kaspersky
BUY ON AMAZON
Java I/O
Closing Output Streams
JAR Archives
The Serializable Interface
Understanding Files
Filename Filters
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
Microsoft WSH and VBScript Programming for the Absolute Beginner
Conditional Logic
Using Procedures to Organize Scripts
Handling Script Errors
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an InfoArea
Entering the Master Data, Text, and Hierarchy Manually
Operational Data Store (ODS)
Creating an ODS Object
Loading Data from R/3 into BW
802.11 Wireless Networks: The Definitive Guide, Second Edition
What Makes Wireless Networks Different
The Extensible Authentication Protocol
Robust Security Network (RSN) Operations
Characteristics of the FH PHY
Site Planning and Project Management
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Part Two. Office Programming in .NET
Working with the Window Object
Form Events, Properties, and Methods
Another Technique for Creating Data-Bound Spreadsheets
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies