Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Computer-Based Testing and the Internet: Issues and Advances
Computer-Based Testing and the Internet: Issues and Advances
We reside in various communities and live in one world. Although we may
reside in Beijing, China, on a kibbutz in Israel, or in Muleshoe, Texas, we are
aware of the impact of world events on our lives.

This has not always been true. Throughout most of history, life generally
was impacted by dominant qualities in
...
MacIntosh Technology in the Common Hardware Reference Platform
MacIntosh Technology in the Common Hardware Reference Platform
This book presents specifications and standards for the Apple Macintosh technology cited in the PowerPC Microprocessor Common Hardware Reference Platform (CHRP) specification.

The CHRP specification is a joint publication of Apple Computer, Inc., International Business Machines Corporation, and Motorola, Inc. It defines a common hardware
...
Web Analytics For Dummies (Computers)
Web Analytics For Dummies (Computers)
Performing your first Web site analysis just got a whole lot easier. Web Analytics For Dummies offers everything you need to know to nail down and pump up the ROI on your Web presence. It explains how to get the stats you need, then helps you analyze and apply that information to improve traffic and click-through rate on your Web...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Schrodinger's Rabbits: The Many Worlds of Quantum
Schrodinger's Rabbits: The Many Worlds of Quantum
"Usually quantum fuzziness appears only in ultratiny arenas, on a scale smaller than a golf ball to the degree that the golf ball is smaller than Texas. But nowadays, in labs around the world, scientists are plotting to release quantum weirdness from its subatomic prison. Before too long, quantum news won't be just for the science section...
Computing with Instinct: Rediscovering Artificial Intelligence
Computing with Instinct: Rediscovering Artificial Intelligence

Simplicity in nature is the ultimate sophistication. The world's magnificence has been enriched by the inner drive of instincts, the profound drive of our everyday life. Instinct is an inherited behavior that responds to environmental stimuli. Instinctive computing is a computational simulation of biological and cognitive instincts, which...

The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach

The modern world offers lots of readily available online resources for learning. Wikipedia, Google, news sources, millions of Web sites and blogs, even YouTube, offer access to information in nearly any subject that triggers your curiosity and interest. Nonetheless, I continue to believe that for deep understanding of something, nothing...

Switching to a Mac For Dummies
Switching to a Mac For Dummies

Maybe you love your iPhone or iPod and are curious about other Apple products. Maybe you’ve had one virus scare too many and are fed up with Windows. Maybe the daunting prospect of upgrading to Windows 7 has made you open to other possibilities. Maybe you’re a Mac fan who wants to show a friend how easy and productive Macs...

Google SketchUp For Dummies (Computer/Tech)
Google SketchUp For Dummies (Computer/Tech)

Get a whole new perspective on 3D modeling

Build your house in 3D, do some remodeling, and share it in Google Earth

Developed with architects and other design gurus in mind, Google SketchUp is the fast, easy way to build 3D models of anything you want — buildings, furniture, or...

NLTK Essentials
NLTK Essentials

Build cool NLP and machine learning applications using NLTK and other Python libraries

About This Book

  • Extract information from unstructured data using NLTK to solve NLP problems
  • Analyse linguistic structures in text and learn the concept of semantic analysis and parsing
  • ...
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)

Over the past few decades the powerful methods of statistical physics and Euclidean quantum field theory have moved closer together, with common tools based on the use of path integrals. The interpretation of Euclidean field theories as particular systems of statistical physics has opened up new avenues for understanding strongly coupled...

unlimited object storage image
Result Page: 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy