Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
The Machine Question: Critical Perspectives on AI, Robots, and Ethics
The Machine Question: Critical Perspectives on AI, Robots, and Ethics

One of the enduring concerns of moral philosophy is deciding who or what is deserving of ethical consideration. Much recent attention has been devoted to the "animal question" -- consideration of the moral status of nonhuman animals. In this book, David Gunkel takes up the "machine question": whether and to what extent...

Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera networks is a highly interdisciplinary area of research that has been very active over the last few years. In this book, we focus specifically on the topic of video understanding in camera networks and touch upon the other related areas (e.g., communication resources, machine learning, cooperative control of multi-agent...
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
The simulation of social behavior in a variety of domains is an increasingly important technological tool.

eference survey of social simulation work, Social Simulation: Technologies, Advances and New Discoveries comprehensively collects the most exciting developments in the field. Drawing research contributions from a vibrant...

Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)

At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...

Tragic Design: The Impact of Bad Product Design and How to Fix It
Tragic Design: The Impact of Bad Product Design and How to Fix It

Bad design is everywhere, and its cost is much higher than we think. In this thought-provoking book, authors Jonathan Shariat and Cynthia Savard Saucier explain how poorly designed products can anger, sadden, exclude, and even kill people who use them. The designers responsible certainly didn’t intend harm, so what can you do...

Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014

Summary

Learn SQL Server Administration in a Month of Lunches is the perfect way to get started with SQL Server operations, including maintenance, backup and recovery, high availability, and performance monitoring. In about an hour a day over a month, you'll learn exactly what you can do, and what you...

DarkMarket: Cyberthieves, Cybercops and You
DarkMarket: Cyberthieves, Cybercops and You

"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." --Roberto Saviano, author of Gommorah

The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a
...

'Lets Do Java
'Lets Do Java
The underlying theme of this course is that Java is a highly portable programming language and is able to run on a very wide range of platforms.

This means that Java software may be required to run on very small scale systems with few resources, such as very limited storage or very small displays, as well as on large networks
...
The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy