Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Network (Second Edition)
Hack Proofing Your Network (Second Edition)
This book is intended to teach skills that will be useful for breaking into computers.
If that statement shocks you, then you probably aren’t familiar with the
legitimate reasons for hacking.These reasons can be security testing, consumer
advocacy and civil rights, military interests, and “hacktivist” politics;
...
Smarty PHP Template Programming And Applications
Smarty PHP Template Programming And Applications
A step-by-step guide to building PHP web sites and applications using the Smarty templating engine
- Bring the benefits of Smarty to your PHP programming
-Give your designers the power to modify content and layout without PHP programming
-Produce code that is easier to debug, maintain, and modify
-Useful for both Smarty
...
Solving Tough Problems: An Open Way of Talking, Listening, and Creating New Realities
Solving Tough Problems: An Open Way of Talking, Listening, and Creating New Realities
ur most common way of solving problems-at home, at work, in our communities, in national and international affairs-is to use our expertise and authority to apply piece-by-piece, tried-and-true "best practices." This works for simple, familiar, uncontentious problems. But it doesn't work for the complex, unfamiliar, conflictual problems...
Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
International Investments (The Addison-Wesley Series in Finance)
International Investments (The Addison-Wesley Series in Finance)
Almost thirty years ago, Bruno Solnik published an article entitled "Why not diver. sify internationally rather than domestically?" in the Financial Analysts Journal Uuly/August 1974). At the time, US. pension funds had never invested outside of the United States. The situation was not very different in most other countries...
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
In the time of Duke Huan of Ch’i [the position of] the son of Heaven had become humble and weak, while the feudal lords used their energies in attacking [one another]. The Southern Yi and Northern Ti engaged the Central States in battle, and the continued existence of the Central States seemed [to hang by] a thin thread...
Pressure Vessel Design Manual, Third Edition
Pressure Vessel Design Manual, Third Edition

Picking up where the success of the previous editions left off, this book is an accumulation of design procedures, methods, techniques, formulations, and data for use in the design of pressure vessels, their respective parts and equipment. It's written specifically for designers and engineers involved in designing and specifying or...

Proceedings of CEE 2019: Advances in Resource-saving Technologies and Materials in Civil and Environmental Engineering (Lecture Notes in Civil Engineering)
Proceedings of CEE 2019: Advances in Resource-saving Technologies and Materials in Civil and Environmental Engineering (Lecture Notes in Civil Engineering)

This book gathers the latest advances, innovations, and applications in the field of effective methods of calculation, resource-saving technologies and advanced materials in civil and environmental engineering, as presented by leading international researchers and engineers at the XVII International Scientific Conference Current...

Fuzzy Models and Algorithms for Pattern Recognition and Image Processing
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing

Fuzzy Models and Algorithms for Pattern Recognition and Image Processing presents a comprehensive introduction of the use of fuzzy models in pattern recognition and selected topics in image processing and computer vision. Unique to this volume in the Kluwer Handbooks of Fuzzy Sets Series is the fact that...

Pattern Recognition and Image Processing (Woodhead Publishing Series in Optical and Electronic Materials)
Pattern Recognition and Image Processing (Woodhead Publishing Series in Optical and Electronic Materials)
This book delivers a course module for advanced undergraduates, postgraduates and researchers of electronics, computing science, medical imaging, or wherever the study of identification and classification of objects by electronics-driven image processing and pattern recognition is relevant. Object analysis first uses image processing to detect...
Rendering with mental ray & 3ds Max
Rendering with mental ray & 3ds Max
Realize your vision with stunning renders of your 3ds Max projects that can only be achieved with a powerful engine like mental ray. Beginning with a concise review of the essential concepts, you proceed to step-by-step tutorials that teach you how to render scenes with

Indirect illumination options including Final Gather, Caustics,
...
Coupled Model Transformations for QoS Enabled Component-Based Software Design
Coupled Model Transformations for QoS Enabled Component-Based Software Design

Performance-aware Component-based Software-Development A characteristic of an engineering discipline is the ability to predict the impact of design decisions. For example, in civil engineering accurate predictions of the impact of adding an additional ?oor on a construction’s statics are available. Having a similar ability in software...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy