Home | Amazing | Today | Tags | Publishers | Years | Search 
Aspect-Oriented Programming with AspectJ
Aspect-Oriented Programming with AspectJ
In a November 2001 Java Pro magazine article, noted Java pundit Daniel Savarese states, "The days of Object-Oriented Programming may be numbered, One day we may all be using Aspect-Oriented Programming ." While this may be hyperbole, the AOP bring certain needed improvements to the OOP. AspectJ is a Java-based tool that allows...
25 Years of Model Checking: History, Achievements, Perspectives (Lecture Notes in Computer Science)
25 Years of Model Checking: History, Achievements, Perspectives (Lecture Notes in Computer Science)
Model checking technology is among the foremost applications of logic to computer science and computer engineering. The model checking community has achieved many breakthroughs, bridging the gap between theoretical computer science and hardware and software engineering, and it is reaching out to new challenging areas such as system biology and...
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Beginning Perl for Bioinformatics
Beginning Perl for Bioinformatics
With its highly developed capacity to detect patterns in data, Perl has become one of the most popular languages for biological data analysis. But if you're a biologist with little or no programming experience, starting out in Perl can be a challenge. Many biologists have a difficult time learning how to apply the language to bioinformatics. The...
Networked Control Systems: Theory and Applications
Networked Control Systems: Theory and Applications
Networked control systems (NCS) consist of sensors, actuators and controllers the operations of which may be distributed over geographically disparate locations and co-ordinated by the exchange of information passed over a communication network. The communication network may be physically wired or not. The widespread applications of the Internet...
Trading for a Living: Psychology, Trading Tactics, Money Management
Trading for a Living: Psychology, Trading Tactics, Money Management
An eminent futures trader explores crucial factors in the markets that most experts overlook--time, volume and open interest--and describes little-known indicators to profitably track them. Covers all the popular technical approaches to futures, options and stock markets including Elliott Wave, oscillators, moving averages, Market Logic,...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

Bioinformatics: Problem Solving Paradigms
Bioinformatics: Problem Solving Paradigms
There are fundamental principles for problem analysis and algorithm design that are continuously used in bioinformatics. This book concentrates on a clear presentation of these principles, presenting them in a self-contained, mathematically clear and precise manner, and illustrating them with lots of case studies from main fields of bioinformatics...
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Our aim with this book was to place, under the same roof, two distinct but intertwined aspects of the use of fingerprinting for personal identification and criminal investigation: (1) the aspects associated with the visualization, detection, and recording of friction ridge skin impressions and (2) the issues regarding the identification or...
Computer-aided Analysis of Active Circuits (Electrical and Computer Engineering)
Computer-aided Analysis of Active Circuits (Electrical and Computer Engineering)
Who could imagine today an electronic engineer designing an intergrated circuit using the classical "paper-and-pencil" method? The new technologies permit the fabrication of large systems containng complex building blocks satisfying tight specifications. Having thousands of interconnected transistors on a single chip is commonplace today....
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
Result Page: 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 364 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy