Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The thrilling memoir of the world's most wanted computer hacker

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed
...

Windows 10 Anniversary Update Bible
Windows 10 Anniversary Update Bible

Your all-inclusive guide to Windows 10 Anniversary Edition

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS....

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Data Structures & Algorithm Analysis in C++
Data Structures & Algorithm Analysis in C++

Data Structures and Algorithm Analysis in C++ is an advanced algorithms book that bridges the gap between traditional CS2 and Algorithms Analysis courses.

As the speed and power of computers increases, so does the need for effective programming and algorithm analysis. By approaching these skills in tandem, Mark Allen...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Discrete and Continuous Fourier Transforms: Analysis, Applications and Fast Algorithms
Discrete and Continuous Fourier Transforms: Analysis, Applications and Fast Algorithms
Long employed in electrical engineering, the discrete Fourier transform (DFT) is now applied in a range of fields through the use of digital computers and fast Fourier transform (FFT) algorithms. But to correctly interpret DFT results, it is essential to understand the core and tools of Fourier analysis. Discrete and Continuous Fourier...
Scheduling: Theory, Algorithms, and Systems
Scheduling: Theory, Algorithms, and Systems

Sequencing and scheduling is a formof decision-making that plays a crucial role in manufacturing and service industries. In the current competitive environment effective sequencing and scheduling has become a necessity for survival in the market-place. Companies have to meet shipping dates that have been committed to customers, as failure to...

Make: Bluetooth: Bluetooth LE Projects with Arduino, Raspberry Pi, and Smartphones
Make: Bluetooth: Bluetooth LE Projects with Arduino, Raspberry Pi, and Smartphones

This book is where your adventures with Bluetooth LE begin. You'll start your journey by getting familiar with your hardware options: Arduino, BLE modules, computers (including Raspberry Pi!), and mobile phones. From there, you'll write code and wire circuits to connect off-the-shelf sensors, and even go all the way to writing your...

6502 assembly-language programming for Apple, Commodore, and Atari computers
6502 assembly-language programming for Apple, Commodore, and Atari computers

Instructs those who have already programmed in high-level languages in programming with the more powerful and versatile assembly or machine language.

...
Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Bioinformatics and Computational Biology Solutions Using R and Bioconductor (Statistics for Biology and Health)
Bioinformatics and Computational Biology Solutions Using R and Bioconductor (Statistics for Biology and Health)

Full four-color book.

Some of the editors created the Bioconductor project and Robert Gentleman is one of the two originators of R.

All methods are illustrated with publicly available data, and a major section of the book is devoted to fully worked case studies.

Code underlying all of the computations that are...

Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
Result Page: 147 146 145 144 143 142 141 140 139 138 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy