Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SELinux by Example: Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux

SELinux: Bring World-Class Security to Any Linux Environment!

 

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure...

.NET Security and Cryptography
.NET Security and Cryptography

Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. .NET Security and...

Agile Principles, Patterns, and Practices in C# (Robert C. Martin Series)
Agile Principles, Patterns, and Practices in C# (Robert C. Martin Series)

With the award-winning book Agile Software Development: Principles, Patterns, and Practices, Robert C. Martin helped bring Agile principles to tens of thousands of Java and C++ programmers. Now .NET programmers have a definitive guide to agile methods with this completely updated volume from...

Fundamentals of Speech Recognition
Fundamentals of Speech Recognition

Provides a theoretically sound, technically accurate, and complete description of the basic knowledge and ideas that constitute a modern system for speech recognition by machine. Covers production, perception, and acoustic-phonetic characterization of the speech signal; signal processing and analysis...

Network Security Essentials (2nd Edition)
Network Security Essentials (2nd Edition)
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols...
Emerging Topics in Computer Vision (IMSC Press Multimedia Series)
Emerging Topics in Computer Vision (IMSC Press Multimedia Series)
The topics in this book were handpicked to showcase what we consider to be exciting and promising in computer vision. They are a mix of more well-known and traditional topics (such as camera calibration, multi-view geometry, and face detection), and newer ones (such as vision for special effects and tensor voting framework). All have the common...
Designing Object Systems: Object-Oriented Modelling with Syntropy
Designing Object Systems: Object-Oriented Modelling with Syntropy

This is a book about object-oriented analysis and design for software developers. There are many such books, so why write another one? The answer is that we wish to make some specific contributions to the philosophy and practice of object-oriented software development which are significantly different from those that can be found in any of...

Debugging Linux Systems
Debugging Linux Systems

Debugging Linux Systems discusses the main tools available today to debug 2.6 Linux Kernels. We start by exploring the seemingly esoteric operations of the Kernel Debugger (KDB), Kernel GNU DeBugger (KGDB), the plain GNU DeBugger (GDB), and JTAG debuggers. We then investigate Kernel Probes, a feature that lets you intrude into a kernel...

The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Category Theory for Computing Science
Category Theory for Computing Science

This book is a textbook in basic category theory, written specifically to be read by researchers and students in computing science. We expound the constructions we feel are basic to category theory in the context of examples and applications to computing science. Some categorical ideas and constructions are already used heavily in computing...

Comparative International Accounting (9th Edition)
Comparative International Accounting (9th Edition)

Firmly established as the leading text in the field, this new edition of Comparative International Accounting has been fundamentally updated to reflect the changes that are occurring in financial accounting and reporting as a result of the introduction of IFRS. Comparative International Accounting takes a comprehensive look at the...

Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy