Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Asterisk Hacking
Asterisk Hacking
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all...
IBM Cognos 8 Report Studio Cookbook
IBM Cognos 8 Report Studio Cookbook

Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences,...

Pro Android Python with SL4A
Pro Android Python with SL4A

This book is about writing real-world applications for the Android platform primarily using the Python language and a little bit of JavaScript. While there is nothing wrong with Java, it really is overkill when all you need to do is turn on or off a handful of settings on your Android device. The Scripting Layer for Android (SL4A)...

Beating IT Risks
Beating IT Risks
Beating IT Risks is quite different in perspective from beating a drum – which
tends to be monotonal. The book is more like a entire symphony in which all
of the voices are in intricate interrelationships. Enabling the reader to learn to
understand the big picture as well as the details is perhaps its most significant...
One-to-One Web Marketing: Build a Relationship Marketing Strategy One Customer at a Time, Second Edition
One-to-One Web Marketing: Build a Relationship Marketing Strategy One Customer at a Time, Second Edition

Markets are becoming increasingly fragmented as the result of global competition. As more companies vie for niche market positions, they spin out a broader array of product and service offerings. The Web, with its relatively low barriers to entry, has accelerated this competition by orders of magnitude. The wide availability of online...

Groovy for Domain-Specific Languages
Groovy for Domain-Specific Languages

You may already be aware that the Java virtual machine runs on everything from the largest mainframe to the smallest microchip and supports almost every conceivable application. What you may not realize is that to develop software in some of these scenarios requires a targeted, single purpose language, a Domain Specific Language. The popular...

Knowledge and Data Management in GRIDs
Knowledge and Data Management in GRIDs
From the reviews:

"This edited book is an early attempt by primarily European researchers to harness and expand the use of grid technologies in accessing distributed sources for sharing, and also to extract and produce knowledge. … Overall, the book is well organized and the selected material represents a very interesting range of...

Routing Congestion in VLSI Circuits: Estimation and Optimization (Integrated Circuits and Systems)
Routing Congestion in VLSI Circuits: Estimation and Optimization (Integrated Circuits and Systems)
With the dramatic increases in on-chip packing densities, routing congestion has become a major problem in chip design. The problem is especially acute as interconnects are also the performance bottleneck in integrated circuits. The solution lies in judicious resource management. This involves intelligent allocation of the available interconnect...
iOS 5 Recipes: A Problem-Solution Approach (Recipes Apress)
iOS 5 Recipes: A Problem-Solution Approach (Recipes Apress)

iOS 5 Recipes: A Problem-Solution Approach is your guide to developing solutions on iPad, iPhone, and other iOS 5 devices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You'll find numerous examples of real-world cases that will enable you to build...

Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation
Integrated Circuit and System Design. Power and Timing Modeling, Optimization, and Simulation

Welcome to the proceedings of the 20th International Workshop on Power and TimingModeling, Optimization and Simulations, PATMOS 2010. Over the years, PATMOS has evolved into an important European event, where researchers from both industry and academia discuss and investigate the emerging challenges in future and contemporary applications,...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy