Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies,...

Coders: Who They Are, What They Think and How They Are Changing Our World
Coders: Who They Are, What They Think and How They Are Changing Our World

Facebook’s algorithms shaping the news. Uber’s cars flocking the streets. Revolution on Twitter and romance on Tinder. We live in a world constructed of computer code. Coders – software programmers – are the people who built it for us. And yet their worlds and minds are little known to outsiders.

...

Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started

Become a Linux sysadmin and expert user of Linux, even with no previous Linux experience and learn to manage complex systems with ease.  Volume 1 of this three volume training course introduces operating systems in general and Linux in particular. It briefly explores the The Linux Philosophy for SysAdmins in preparation for the...

Practical Security: Simple Practices for Defending Your Systems
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Practical Quantum Computing for Developers: Programming Quantum Rigs in the Cloud using Python, Quantum Assembly Language and IBM QExperience
Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers...
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research...
Computer Graphics Through OpenGL®: From Theory to Experiments
Computer Graphics Through OpenGL®: From Theory to Experiments

COMPREHENSIVE COVERAGE OF SHADERS AND THE PROGRAMMABLE PIPELINE

From geometric primitives to animation to 3D modeling to lighting, shading and texturing, Computer Graphics Through OpenGL®: From Theory to Experiments is a comprehensive introduction to computer graphics which uses an active...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Financial Modeling in Excel For Dummies
Financial Modeling in Excel For Dummies

Make informed business decisions with the beginner's guide to financial modeling using Microsoft Excel

Financial Modeling in Excel For Dummies is your comprehensive guide to learning how to create informative, enlightening financial models today. Not a math whiz or an Excel power-user? No problem! All you need is...

Web Coding & Development All-in-One For Dummies (For Dummies (Computer/Tech))
Web Coding & Development All-in-One For Dummies (For Dummies (Computer/Tech))

Speak the languages that power the web

With more high-paying web development jobs opening every day, people with coding and web/app building skills are having no problems finding employment. If you’re a would-be developer looking to gain the know-how to build the interfaces, databases, and other features that run...

Result Page: 660 659 658 657 656 655 654 653 652 651 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy