Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)

This book is written from an engineer's perspective of the mind. "Artificial Mind System" exposes the reader to a broad spectrum of interesting areas in general brain science and mind-oriented studies. In this research monograph a picture of the holistic model of an artificial mind system and its behaviour is drawn, as concretely as...

Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

.NET Windows Forms Custom Controls
.NET Windows Forms Custom Controls

The intent of this book is to teach .NET developers the skills necessary to create their own leading edge custom controls. The art of creating custom controls has never been truly explored in detail, often the examples provided are trivial and do not begin to explore the requirements need for a commercial quality custom control. This book will...

Game Engine Toolset Development
Game Engine Toolset Development
Toolset development is an extremely broad topic. Game Engine Toolset Development provides you with a core set of skills and a comprehensive insight that will aid you in the development of game engine utilities, significantly reducing the time period associated with the construction phase of a project. The book starts off with topics regarding...
Agent-Based Hybrid Intelligent Systems
Agent-Based Hybrid Intelligent Systems
Many complex problems, such as financial investment planning, involve many different components or sub-tasks, each of which requires different types of processing. To solve such complex problems, a great diversity of intelligent techniques, including traditional hard computing techniques (e.g., expert systems) and soft computing techniques (e.g.,...
Multiagent System Technologies: Second German Conference, MATES 2004, Erfurt, Germany, September 29-30, 2004, Proceedings
Multiagent System Technologies: Second German Conference, MATES 2004, Erfurt, Germany, September 29-30, 2004, Proceedings
This book constitutes the refereed proceedings of the Second German Conference on Multiagent Systems Technologies, MATES 2004, held in Erfurt, Germany, in September 2004.

The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on...

Design Recipes for FPGAs
Design Recipes for FPGAs
This book provides a rich toolbox of design techniques and templates to solve practical, every-day problems using FPGAs. Using a modular structure, the book gives easy-to-find design techniques and templates at all levels, together with functional code, which engineers can easily match and apply to their application.

The easy-to-find
...
Symbian OS Communications Programming
Symbian OS Communications Programming
Welcome to the updated edition of Symbian OS Communications Programming! In this book we’ll introduce you to much of the major communications functionality in Symbian OS and demonstrate how to perform common tasks in each area.

For this new edition we’ve started from scratch to produce chapters that are relevant to you as
...
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
Scott Empson is currently the associate chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, teaching Cisco® routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. He...
unlimited object storage image
Result Page: 2266 2265 2264 2263 2262 2261 2260 2259 2258 2257 2256 2255 2254 2253 2252 2251 2250 2249 2248 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy