Home | Amazing | Today | Tags | Publishers | Years | Search 
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
In the time of Duke Huan of Ch’i [the position of] the son of Heaven had become humble and weak, while the feudal lords used their energies in attacking [one another]. The Southern Yi and Northern Ti engaged the Central States in battle, and the continued existence of the Central States seemed [to hang by] a thin thread...
The Journey from Manager to Leader
The Journey from Manager to Leader

The Journey from Manager to Leader: A Playbook for Success approaches successful leadership from a unique angle: storytelling and sports metaphors. Author William Jones illustrates insightful new pathways to winning in the business world. This book hits a home run for managers, attacking real world scenarios with practical advice from...

How to Solve It: A New Aspect of Mathematical Method
How to Solve It: A New Aspect of Mathematical Method

A perennial bestseller by eminent mathematician G. Polya, How to Solve It will show anyone in any field how to think straight. In lucid and appealing prose, Polya reveals how the mathematical method of demonstrating a proof or finding an unknown can be of help in attacking any problem that can be "reasoned" out--from building...

Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Liars and Outliers: Enabling the Trust that Society Needs to Thrive

Just today, a stranger came to my door claiming he was here to unclog a bathroom drain. I let him into my house without verifying his identity, and not only did he repair the drain, he also took off his shoes so he wouldn’t track mud on my floors. When he was done, I gave him a piece of paper that asked my bank to give him some money....

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

Robust Data Mining (SpringerBriefs in Optimization)
Robust Data Mining (SpringerBriefs in Optimization)

Data uncertainty is a concept closely related with most real life applications that involve data collection and interpretation. Examples can be found in data acquired with biomedical instruments or other experimental techniques. Integration of robust optimization in the existing data mining techniques aim to create new algorithms resilient to...

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Energy Supply and Renewable Resources
Energy Supply and Renewable Resources
One has only to read a newspaper or magazine to realize the importance of energy at this early juncture of the 21st century. It will surely become more critical as world demand for oil continues to increase and its supply peaks and begins to fall.

Industrialized nations have become addicted to an ever-increasing
...
Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy