Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
This book constitutes the thoroughly refereed post-proceedings of the joint International Workshops on Trading Agent Design and Analysis, TADA 2006, and on Agent Mediated Electronic Commerce, AMEC VIII 2006, held in Hakodate, Japan, in May 2006 as an associated event of AAMAS 2006, the 5th International Joint Conference on Autonomous Agents and...
Systematics as Cyberscience: Computers, Change, and  Continuity in Science (Inside Technology)
Systematics as Cyberscience: Computers, Change, and Continuity in Science (Inside Technology)
The use of information and communication technology in scientific research has been hailed as the means to a new larger-scale, more efficient, and cost-effective science. But although scientists increasingly use computers in their work and institutions have made massive investments in technology, we still have little idea how computing affects the...
Web Site Design Is Communication Design (Document Design Companion Series, V. 2)
Web Site Design Is Communication Design (Document Design Companion Series, V. 2)
This title is based on a series of case studies of the website design processes in smaller and larger organizations. It offers a thorough analysis of the activities undertaken, in conbination with practical experiences of website designers and producers. It pays attention to the often complicated organizational context that web deigners and...
Polarimetric Radar Imaging: From Basics to Applications (Optical Science and Engineering)
Polarimetric Radar Imaging: From Basics to Applications (Optical Science and Engineering)
… This very concise book covering basics to applications will serve as a fundamental hands-on book for years to come. … we congratulate the authors for their diligence, oversight, and sincere dedication for assembling such a well-organized and long overdue book on the basics and applications of polarimetric radar imaging. …...
Investment Manager Analysis: A Comprehensive Guide to Portfolio Selection, Monitoring and Optimization
Investment Manager Analysis: A Comprehensive Guide to Portfolio Selection, Monitoring and Optimization
Investment Manager Analysis provides readers with a broad framework that covers the investment manager due diligence process from initial screening to analytical techniques, interviewing skills, and legal and contract negotiations. As it guides the reader through the selection process, it clearly demonstrates a variety of mechanisms for...
Options Trading for the Conservative Investor: Increasing Profits without Increasing Your Risk (2nd Edition)
Options Trading for the Conservative Investor: Increasing Profits without Increasing Your Risk (2nd Edition)

“The author’s option trading guidelines include important issues often overlooked by investors. Attention conservative investors! Michael C. Thomsett’s Options Trading for the Conservative Investor has hit a bull’s-eye...for you!”

Marty...

Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Applied Interval Analysis
Applied Interval Analysis

This book is about guaranteed numerical methods based on interval analysis for approximating sets, and about the application of these methods to vast classes of engineering problems. Guaranteed means here that inner and outer approximations of the sets of interest are obtained, which can be made as precise as desired, at the cost of...

Classification, Clustering, and Data Mining Applications: Proceedings
Classification, Clustering, and Data Mining Applications: Proceedings
This book presents some of the key research undertaken by the members of the International Federation of Classification Societies during the two years since our last symposium. If the past is a guide to the future, these papers contain the seeds of new ideas that will invigorate our field.

The editors are grateful
...
Root Genomics and Soil Interactions
Root Genomics and Soil Interactions

Fully integrated and comprehensive in its coverage, Root Genomics and Soil Interactions examines the use of genome-based technologies to understand root development and adaptability to biotic and abiotic stresses and changes in the soil environment. Written by an international team of experts in the field, this timely review highlights...

unlimited object storage image
Result Page: 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy