Hacking: The Art of Exploitation, 2nd Edition Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,...
Bottlenecks: Aligning UX Design with User Psychology
Learn the psychological constrictions of attention, perception, memory, disposition, motivation, and social influence that determine whether customers will be receptive to your digital innovations.
Bottlenecks: Aligning UX Design with User Psychology fills a need for entrepreneurs, designers, and marketing...
Applications in Engineering, Life and Social Sciences (De Gruyter Reference)
Fractional Calculus (FC) has originated in 1695, nearly at the same time as conventional calculus. However, FC attracted limited attention and remained a pure mathematical exercise in spite of the original contributions of important mathematicians,
physicists and engineers. FC had a rapid development during the last few decades,
Embedded Hardware (Newnes Know It All) "The authors know their subject and present it well. Examples include C and BASIC code that will run on a PIC12F675 microcontroller."
"If you want information about the overall aspects of empbedded-system design, this book deserves a look."
"David Katz and Rick Gentile of Analog Devices do an admirable...
Fantasies of Time and Death: Dunsany, Eddison, Tolkien
This book reveals the unique contribution made by the three founding fathers of British fantasy?Lord Dunsany, E. R. Eddison and J. R. R. Tolkien?to our culture’s perennial reassessment of the meanings of time, death and eternity. It traces the poetic, philosophical and theological roots of the striking preoccupation with mortality and... Learning from Data Streams: Processing Techniques in Sensor Networks Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Sensors are equipped with capacities to store information in memory, process this information and communicate with their neighbors. Processing data streams generated from wireless sensor networks has raised new research challenges over the last few...
|Result Page: 97 96 95 94 93 92 91 90 89 88 87 |