Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Introduction to the Theory of Computation
Introduction to the Theory of Computation

Gain a clear understanding of even the most complex, highly theoretical computational theory topics in the approachable presentation found only in the market-leading INTRODUCTION TO THE THEORY OF COMPUTATION, 3E. The number one choice for today's computational theory course, this revision continues the book's well-know, approachable...

Create Your Own Blog: 6 Easy Projects to Start Blogging Like a Pro (2nd Edition)
Create Your Own Blog: 6 Easy Projects to Start Blogging Like a Pro (2nd Edition)

Create Your Own Blog

6 Easy Projects to Start Blogging Like a Pro
Second Edition

 

6 Easy Projects to Start Blogging Like a Pro

Personal Blogging Using WordPress.com • Build a...

Developing and Evaluating Security-Aware Software Systems
Developing and Evaluating Security-Aware Software Systems

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field.

Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software...

Murach's MySQL
Murach's MySQL

Note: The current edition of this book is Murach's MySQL, 2nd Edition.

This practical, hands-on training and reference guide is perfect for developers who need to learn MySQL. Written by Joel Murach, the author of bestselling "Java Servlets and JSP" and "PHP and MySQL" books, this is exactly the...

Fundamentals of Wireless Communication Engineering Technologies
Fundamentals of Wireless Communication Engineering Technologies

A broad introduction to the fundamentals of wireless communication engineering technologies

Covering both theory and practical topics, Fundamentals of Wireless Communication Engineering Technologies offers a sound survey of the major industry-relevant aspects of wireless communication engineering technologies. Divided...

Power Converters and AC Electrical Drives with Linear Neural Networks (Energy, Power Electronics, and Machines)
Power Converters and AC Electrical Drives with Linear Neural Networks (Energy, Power Electronics, and Machines)

The first book of its kind, Power Converters and AC Electrical Drives with Linear Neural Networks systematically explores the application of neural networks in the field of power electronics, with particular emphasis on the sensorless control of AC drives. It presents the classical theory based on space-vectors in...

Microsoft Visual Studio LightSwitch Unleashed
Microsoft Visual Studio LightSwitch Unleashed

Microsoft® Visual Studio® LightSwitch® Unleashed

Alessandro Del Sole

 

Microsoft Visual Studio LightSwitch represents a breakthrough in business application development for Windows clients, the Web, and the cloud....

New Perspectives on the Internet: Comprehensive
New Perspectives on the Internet: Comprehensive

NEW PERSPECTIVES ON THE INTERNET has been updated to cover the newest releases of the three main web browsers including Internet Explorer 9, Mozilla Firefox 4, and Google Chrome. With the New Perspectives critical-thinking, problem-solving approach, you will learn basic to advanced features of the Internet from Browser Basics to Electronic...

Integrative Production Technology for High-Wage Countries
Integrative Production Technology for High-Wage Countries

Industrial production in high-wage countries like Germany is still at risk. Yet, there are many counter-examples in which producing companies dominate their competitors by not only compensating for their specific disadvantages in terms of factor costs (e.g. wages, energy, duties and taxes) but rather by minimising waste using synchronising...

Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem

Philosophers of science have long used reconstructive reasoning to develop historical explanations covering the origins of natural phenomenon. The application of the scientific method is a powerful tool for solving crimes through reconstruction of the events. Scientific Foundations of Crime Scene Reconstruction: Introducing Method to...

Data-Intensive Computing: Architectures, Algorithms, and Applications
Data-Intensive Computing: Architectures, Algorithms, and Applications

The world is awash with digital data from social networks, blogs, business, science, and engineering. Data-intensive computing facilitates understanding of complex problems that must process massive amounts of data. Through the development of new classes of software, algorithms, and hardware, data-intensive applications can provide timely and...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy