Flylib.com
How to Recover Unreadable CDs?
Previous page
Table of content
Next page
Chapter 1: CD Organization
Table 1.1: The format of Q-subchannel data
Table 1.2: Conventional notation for all possible types of errors
Chapter 2: Power of Reed-Solomon Codes
Table 2.1: Dividing bits into check bits and data bits
Table 2.2: Polynomials (left column) and powers of two corresponding to them (right column)
Chapter 4: Interfaces for Interaction with the Hardware
Table 4.1: Description of IOCTL commands of the standard CD-ROM driver (more detailed information is provided in Windows NT DDK)
Table 4.2: An example of a CDB which, being transmitted to a SCSI device, makes it read sector 0—69
Table 4.3: Main Sense Key values (error categories) and their descriptions
Table 4.4: Main ASC and ASCQ codes
Table 4.5: Interrelation between the type of requested data and the length of the returned sector
Table 4.6: The comparison of different methods of access ( undesired characteristics are highlighted)
Chapter 6: Anti-Copying Mechanisms
Table 6.1: The structure of a TDB terminating with one TDU
Previous page
Table of content
Next page
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (Uncovered series)
ISBN: 1931769338
EAN: 2147483647
Year: 2003
Pages: 60
Authors:
Kris Kaspersky
BUY ON AMAZON
MySQL Stored Procedure Programming
Parameters
Using SELECT Statements with an INTO Clause
Conclusion
Error Handling
Creating Stored Functions
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Improving the Testing Process
Some Final Thoughts…
Appendix B Testing Survey
Appendix D Sample Master Test Plan
Postfix: The Definitive Guide
Queue Tools
POP and IMAP
Separate Domains with Virtual Accounts
Simple Mailing Lists
Postfix and TLS
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 13. Remote Control Windows with Bluetooth Phones and PDAs
Hack 29. Detect Networks with Kismet
Hack 55. Increase the Range of a PowerBook
Hack 60. Backlight Your Zipit
Hack 68. Set Up an OLSR Mesh Network
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
Enabling Application Inspection Using the Modular Policy Framework
Selective Inspection
General Packet Radio Service Tunneling Protocol
Case Study 1: Deploying the Cisco ASA at Branch Offices and Small Businesses
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Descriptive Statistics and Data Displays
Variation Analysis
Identifying and Verifying Causes
Selecting and Testing Solutions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies