Home | Amazing | Today | Tags | Publishers | Years | Search 
The Ultimate Palm Robot
The Ultimate Palm Robot

No programming required--CD includes software

Now, anyone curious about robotics can inexpensively build and enjoy their very own robot using any Palm handheld for the brains. Originally developed by Carnegie Mellon University robotics department graduate students, this prototype has enjoyed a cult following among enthusiasts. Using...

Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

Topology Control in Wireless Ad Hoc and Sensor Networks
Topology Control in Wireless Ad Hoc and Sensor Networks
Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks. 

Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting...

Java Concurrency in Practice
Java Concurrency in Practice

"Java Concurrency in Practice is an invaluable compilation of threading know-how for Java developers. I found reading this book intellectually exciting, in part because it is an excellent introduction to Java's concurrency API, but mostly because it captures in a thorough and accessible way expert knowledge...

Network Security Bible
Network Security Bible
If you need a solid foundation in network security, this is it

Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how
...
Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Evaluating Project Decisions: Case Studies in Software Engineering
Evaluating Project Decisions: Case Studies in Software Engineering
Effective decisions are crucial to the success of any software project, but to make better decisions you need a better decision-making process. In Evaluating Project Decisions, leading project management experts introduce an innovative decision model that helps you tailor your decision-making...
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform
J2EE Technology in Practice: Building Business Applications with the Java 2 Platform

Since its introduction, The Java 2 Platform, Enterprise Edition (J2EE) has achieved remarkable success among application server providers and their customers. More than a dozen leading application server companies have announced J2EE compatible products, and over one million developers have downloaded the J2EE SDK from Sun's J2EE Web site (...

Think and Grow Rich
Think and Grow Rich
...During our ten-year association, I learned the missing number to my combination for worldwide successful achievement. The Master Mind Principle: two or more persons working together in complete harmony toward a mutual goal or goals...Napoleon Hill's philosophy teaches you what you were never taught. Specifically: How to Recognize, Relate,...
Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
Pass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!

The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy