Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco Cookbook
Cisco Cookbook

Cisco routers are nearly ubiquitous in IP networks. They are extremely flexible and reliable devices, and the number and variety of features grows with each new release of the Internetwork Operating System (IOS). While Cisco Press and several other publishers supply excellent documentation of router features both online and...

Theory of Linear Operations (North-Holland Mathematical Library)
Theory of Linear Operations (North-Holland Mathematical Library)
The theory of operators, created by V. Volterra, has as its object the study of functions defined on infinite-dimensional spaces. This theory has penetrated several highly important areas of mathematics in an essential way: suffice it to recall that the theory of integral equations and the calculus of variations are included as special cases within...
Creativity Across Domains: Faces of the Muse
Creativity Across Domains: Faces of the Muse
Creativity Across Domains: Faces of the Muse sorts through the sometimes-confusing theoretical diversity that domain specificity has spawned. It also brings together writers who have studied creative thinkers in different areas, such as the various arts, sciences, and communication/leadership. Each contributor explains what is known about the...
The Cognitive Dynamics of Computer Science
The Cognitive Dynamics of Computer Science
A groundbreaking, unifying theory of computer science for low-cost, high-quality software

The Cognitive Dynamics of Computer Science represents the culmination of more than thirty years of the author's hands-on experience in software development, which has resulted in a remarkable and sensible...

The Handbook of High Performance Virtual Teams: A Toolkit for Collaborating Across Boundaries
The Handbook of High Performance Virtual Teams: A Toolkit for Collaborating Across Boundaries
The Handbook of High-Performance Virtual Teams

The Handbook of High-Performance Virtual Teams is an essential resource for leaders, virtual team members, and work group leaders. The editors provide a proven framework based on five principles for working collaboratively across boundaries of time, space, and culture. Written by experts in the...

Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))
Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))

How do successful agile teams deliver bug-free, maintainable software—iteration after iteration? The answer is: By seamlessly combining development and testing. On such teams, the developers write testable code that enables them to verify it using various types of...

A Dictionary of Real Numbers
A Dictionary of Real Numbers
How do we recognize that the number .93371663... is actually 21og1 0(e + 7r)/2 ? Gauss observed that the number 1.85407467... is (essentially) a rational value of an elliptic integral—an observation that was critical in the development of nineteenth century analysis. How do we decide that such a number is actually a special value of a...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Real Options Analysis Course : Business Cases and Software Applications
Real Options Analysis Course : Business Cases and Software Applications
Praise for Real Options Analysis Course

"Dr. Mun’s latest book is a logical extension of the theory and application presented in Real Options Analysis. More specifically, the Real Options Analysis Course presents numerous real options examples and provides the reader with step-by-step problem-solving techniques. After having read the...

Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
unlimited object storage image
Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy