Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sensor Network Operations
Sensor Network Operations

Designing and operating sensor networks, featuring leading researchers and the latest, yet unpublished findings

Sensor Network Operations introduces mission-oriented sensor networks as distributed dynamic systems of interacting sensing devices, which function as a network to execute complex...

Digital Filmmaking for Teens
Digital Filmmaking for Teens
You don't have to invest a small fortune, own expensive gear, and employ an army of technicians to create a movie. Today's high-tech tools will fit in your backpack and don't require the financial backing of a major movie studio, making this the first generation in the history of moviemaking that doesn't have to beg for big bucks to put its stories...
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Reinventing Liberalism: The Politics, Philosophy and Economics of Early Neoliberalism (1920-1947) (Springer Studies in the History of Economic Thought)
Reinventing Liberalism: The Politics, Philosophy and Economics of Early Neoliberalism (1920-1947) (Springer Studies in the History of Economic Thought)

In April 1947, a group of right-leaning intellectuals met in the Swiss Alps for a ten-day conference with the aim of establishing a permanent organization. Named “an army of fighters for freedom” by Friedrich Hayek, they would at times use “neoliberalism” as a description of the philosophy they were...

Sams Teach Yourself SQL in 24 Hours (2nd Edition)
Sams Teach Yourself SQL in 24 Hours (2nd Edition)
Written by college instructors, Sams Teach Yourself SQL in 24 Hours quickly teaches beginning- to intermediate-level SQL users how to create, store, access and manipulate data using a proven step-by-step format that teaches SQL by example. This book contains a thorough explanation of database concepts, SQL procedures, and low-level programming,...
Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
Fundamental data structures in a consistent object-oriented framework

Now revised to reflect the innovations of Java 5.0, Goodrich and Tamassia’s Fourth Edition of Data Structures and Algorithms in Java continues to offer accessible coverage of fundamental data structures, using a consistent...

Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies...

Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Level Up!: The Guide to Great Video Game Design
Level Up!: The Guide to Great Video Game Design

Design and build cutting-edge video games with help from video game expert Scott Rogers!

If you want to design and build cutting-edge video games but aren’t sure where to start, then this is the book for you. Written by leading video game expert Scott Rogers, who has designed the hits Pac Man World, Maxim vs....

Handbook of Chemical and Biological Warfare Agents
Handbook of Chemical and Biological Warfare Agents
With terrorist groups expanding their weapons of destruction beyond bombs and bullets, chemical and biological warfare agents aren't merely limited to the battlefield anymore. In some cases, they are now being used on a new front: major metropolitan cities. And in the Handbook of Chemical and Biological Warfare Agents, emergency response...
Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of...
Pro SQL Server 2008 XML
Pro SQL Server 2008 XML

Knowledge and ability to apply XML are de rigueur in today’s world, and SQL Server developers and administrators are no exception to that rule. Pro SQL Server 2008 XML is your key to unlocking the powerful XML feature set first introduced in SQL Server 2005 and since refined in SQL Server 2008. Author Michael...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy