Home | Amazing | Today | Tags | Publishers | Years | Search 
Interactive Theorem Proving and Program Development
Interactive Theorem Proving and Program Development

A practical introduction to the development of proofs and certified programs using Coq.

An invaluable tool for researchers, students, and engineers interested in formal methods and the development of zero-fault software.

...
Securing SQL Server, Second Edition: Protecting Your Database from Attackers
Securing SQL Server, Second Edition: Protecting Your Database from Attackers

Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names...

Java 7 Pocket Guide
Java 7 Pocket Guide

When you need quick answers for developing or debugging Java programs, this pocket guide provides a handy reference to the standard features of the Java programming language and its platform. You’ll find helpful programming examples, tables, figures, and lists, as well as supplemental information about topics including the Java...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Architecting Complex-Event Processing Solutions with TIBCO® (TIBCO Press)
Architecting Complex-Event Processing Solutions with TIBCO® (TIBCO Press)

The architecture series from TIBCO® Press comprises a coordinated set of titles for software architects and developers, showing how to combine TIBCO components to design and build real-world solutions.

 

Complex-event processing is required when...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Pixel Art for Game Developers
Pixel Art for Game Developers

Is the art for your video game taking too long to create? Learning to create Pixel Art may be the answer to your development troubles. Uncover the secrets to creating stunning graphics with Pixel Art for Game Developers. The premier how-to book on Pixel Art and Pixel Art software, it focuses on the universal principles of the...

CCNA Data Center - Introducing Cisco Data Center Networking Study Guide: Exam 640-911
CCNA Data Center - Introducing Cisco Data Center Networking Study Guide: Exam 640-911

A must-have study guide for exam 640-911 on Cisco's UnifiedData Center

The Cisco Certified Network Associate Data Center certificationis Cisco's newest certification, covering the Cisco Unified DataCenter technologies. Written by unparalleled author and Ciscoauthority Todd Lammle, and CCIE John Swartz, this...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4
MCPD 70-519 Exam Ref: Designing and Developing Web Applications Using Microsoft .NET Framework 4

Prepare for MCPD Exam 70-519—and help demonstrate your real-world mastery of web application design and development—with this official Microsoft® Exam Ref. Written for experienced, MCTS-certified professionals ready to advance their status—this guide focuses on the critical-thinking and decision-making acumen...

Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy