Home | Amazing | Today | Tags | Publishers | Years | Search 
Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
The predominate language for the development of embedded systems is clearly C. Other languages certainly have their allure, but over 80% of all embedded systems are developed in this classic language. Many of the advances in the industry assume the use of object-oriented languages, web clients, and technologies that are either...
Real Analysis and Foundations, Second Edition (Textbooks in Mathematics)
Real Analysis and Foundations, Second Edition (Textbooks in Mathematics)

Students preparing for courses in real analysis often encounter either very exacting theoretical treatments or books without enough rigor to stimulate an in-depth understanding of the subject. Further complicating this, the field has not changed much over the past 150 years, prompting few authors to address the lackluster or overly complex...

Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work
Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work

There has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data...

Graph Databases
Graph Databases
Graph databases address one of the great macroscopic business trends of today: leveraging complex and dynamic relationships in highly connected data to generate insight and competitive advantage. Whether we want to understand relationships between customers, elements in a telephone or data center network, entertainment...
TouchDevelop: Programming on the Go
TouchDevelop: Programming on the Go

"The book is great! It's clear and easy to read, with loads of examples that showed my students what to do."       

-- Larry Snyder, Emeritus Professor, University of Washington, Department of Computer Science and Engineering

“Having the TouchDevelop book
...

Textbook of Interventional Cardiology with DVD, 5e
Textbook of Interventional Cardiology with DVD, 5e

Completely refocused and reorganized, the new Edition of this respected resource offers you comprehensive, detailed, up-to-date, and clinically oriented coverage on all aspects of interventional cardiology. Edited by the world's most prominent specialist and researcher and contributed by more than 75 leaders in the field, this 5th edition...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
Handbook on Decision Support Systems 1: Basic Themes (International Handbooks on Information Systems)
Handbook on Decision Support Systems 1: Basic Themes (International Handbooks on Information Systems)
Decision support systems comprise a core subject area of the information systems (IS) discipline, being one of several major expansions that have occurred in the IS field. The decision support system (DSS) area, as a subject of research and practice, continues to grow along ever-widening horizons – often blending with other...
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu
Wireless Algorithms, Systems, and Applications: 6th International Conference, WASA 2011, Chengdu

This book constitutes the refereed proceedings of the 6th Annual International Conference on Wireless Algorithms, Systems, and Applications, WASA 2011, held in Chengdu, China, in August 2011. The 26 revised full papers and 13 invited papers presented were carefully reviewed and selected from numerous submissions. The papers address all...

Result Page: 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy