Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

Advanced Mathematics and Mechanics Applications Using MATLAB, Third Edition
Advanced Mathematics and Mechanics Applications Using MATLAB, Third Edition

This book uses MATLABR to analyze various applications in mathematics and mechanics. The authors hope to encourage engineers and scientists to consider this modern programming environment as an excellent alternative to languages such as FORTRAN or C++. MATLAB1 embodies an interactive environment with a high level programming language...

IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

From Writing to Computers
From Writing to Computers
... the broad and clear analysis of writing and language, and of automata theory, formal logic, and computability theory he uses to reach [his conclusion] is well worth reading.
–H. D. Warner, Western New England College

From Writing to Computers takes as its central theme the issue of a
...
Practical Text Mining with Perl (Wiley Series on Methods and Applications in Data Mining)
Practical Text Mining with Perl (Wiley Series on Methods and Applications in Data Mining)
Provides readers with the methods, algorithms, and means to perform text mining tasks

This book is devoted to the fundamentals of text mining using Perl, an open-source programming tool that is freely available via the Internet (www.perl.org). It covers mining ideas from several perspectives—statistics, data mining,...

Geometric Methods for Quantum Field Theory
Geometric Methods for Quantum Field Theory
Both mathematics and mathematical physics have many active areas of research where the interplay between geometry and quantum field theory has proved extremely fruitful. Duality, gauge field theory, geometric quantization, Seiberg-Witten theory, spectral properties and families of Dirac operators, and the geometry of loop groups offer some striking...
Real-Life X-Files: Investigating the Paranormal
Real-Life X-Files: Investigating the Paranormal
"Whoever said that the truth is both stranger and more entertaining than fiction describes this book exactly." -- Skeptical Inquirer

Interest in the paranormal is at an all-time high. Ghosts, UFOs, psychic power and other unexplained phenomena are endlessly fascinating for us. People often seem to accept of
...
Data Mashups in R
Data Mashups in R
This article demonstrates how the realworld data is imported, managed, visualized, and analyzed within the R statistical framework. Presented as a spatial mashup, this tutorial introduces the user to R packages, R syntax, and data structures. The user will learn how the R environment works with R packages as well as its own capabilities in...
Newman and the Alexandrian Fathers: Shaping Doctrine in Nineteenth-Century England
Newman and the Alexandrian Fathers: Shaping Doctrine in Nineteenth-Century England
John Henry (later Cardinal) Newman is generally known to have been devoted to reading the Church Fathers. In this volume, Benjamin King draws on archive as well as published material to explore how Newman interpreted specific Fathers at different periods of his life. King draws connections between the Alexandrian Fathers Newman was reading and the...
Forensic Art (Crime Scene Investigations)
Forensic Art (Crime Scene Investigations)

The popularity of crime scene and investigative crime shows on television has come as a surprise to many who work in the field. The main surprise is the concept that crime scene analysts are the true crime solvers, when in truth, it takes dozens of people, doing many different jobs, to solve a crime. Often, the crime scene analyst’s...

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

unlimited object storage image
Result Page: 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy