Home | Amazing | Today | Tags | Publishers | Years | Search 
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card Research and Advanced Applications Conference (CARDIS 2018), which was held in Montpellier, France, during November 12–14, 2018, and organized by the Montpellier Laboratory of Informatics, Robotics and Microelectronics (LIRMM)....
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))

This volume contains the proceedings of the 8th International PhD Student Workshop on Service Life and Durability of Reinforced Concrete Structures that was held in Marne-la-Vallée, France, on September the 26th and 27th 2016.

Topics discussed in the book are related to durability performance of reinforced...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

Security for Software Engineers
Security for Software Engineers

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

The book explores the key areas of attack...

Info We Trust: How to Inspire the World with Data
Info We Trust: How to Inspire the World with Data

How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.

Creating Info We Trust is a craft that puts the world into forms that are strong and true.  It begins with maps,...

Why We Fight: One Man's Search for Meaning Inside the Ring
Why We Fight: One Man's Search for Meaning Inside the Ring

A physical and philosophical mediation on why we are drawn to fight each other for sport, what happens to our bodies and brains when we do, and what it all means

Anyone with guts or madness in him can get hit by someone who knows how; it takes a different kind of madness, a more persistent
...

Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
This book examines the role of deceptive tactics in the criminal victimization process, showing how various forms of manipulative aggression can help disguise dangerous advances. The author approaches crime victimization as the final stage in a purposeful, predictable, dynamic, and progressively dangerous process involving...
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
The easy way for kids to get started with video game design

Is your youngster a designer at heart? Read on! Designing Digital Games helps children apply their design skills to video game design using Scratch—and this book! Introducing simple programming concepts over the course of three easy-to-follow projects,...

Mastering Game Development with Unreal  Engine 4: Build high-performance AAA games with UE 4, 2nd Edition
Mastering Game Development with Unreal Engine 4: Build high-performance AAA games with UE 4, 2nd Edition

A comprehensive guide with coverage on AudioFX, Particle system, shaders, sequencers, and the latest features of Unreal 4.19 that will take your game development skills to the next level

Key Features

  • Create a high-performance Combat game using the essential features of Unreal Engine...
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy