 |
|
|
 Computer Viruses and Other Malicious Software: A Threat to the Internet EconomyMalware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents... |  |  |  |  |
|
 Principles and Models of Biological TransportTransport processes are ubiquitous in the living organism, underlying nerve conduction and muscle contraction, digestion, kidney function and the nourishment of every cell in the body. The mechanisms by which these processes take place, and the models that describe them, are the subject of Principles and Models of Biological Transport,... |  |  |  |  Embedded Linux Development Using EclipseDoug Abbott examines Eclipse and its ability to save time and money while designing and developing an embedded system!
The Eclipse environment solves the problem of having to maintain your own Integrated Development Environment (IDE), which is time consuming and costly. Embedded tools can also be easily integrated into... |
|
 Character Animation with Poser Pro (Graphics Series)Discover how to bring your Poser characters to life with the latest version of Poser, the powerful 3D figure design software. "Character Animation with Poser Pro" shows animators, graphic artists, and game developers how to create high-quality, animated 3D characters, applying the fundamental principles and basic techniques of character... |  |  Robotic Mapping and Exploration (Springer Tracts in Advanced Robotics)"Robotic Mapping and Exploration" is an important contribution in the area of simultaneous localization and mapping (SLAM) for autonomous robots, which has been receiving a great deal of attention by the research community in the latest few years. The contents are focused on the autonomous mapping learning problem. Solutions... |  |  The Best of 2600: A Hacker OdysseyThe hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a... |
|
| Result Page: 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 |