|
|
|
|
A Course in Real Analysis
A Course in Real Analysis provides a firm foundation in real analysis concepts and principles while presenting a broad range of topics in a clear and concise manner. This student-oriented text balances theory and applications, and contains a wealth of examples and exercises. Throughout the text, the authors adhere to the idea that most... | | The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)
The abstract branch of theoretical computer science known as Computation Theory typically appears in undergraduate academic curricula in a form that obscures both the mathematical concepts that are central to the various components of the theory and the relevance of the theory to the typical student. This regrettable situation is due largely... | | Getting Started with Hazelcast
An easy-to-follow and hands-on introduction to the highly scalable data distribution system, Hazelcast, and its advanced features.
Overview
-
Understand how to revolutionize the way you share data across your application
-
A one-stop guide to this bleeding edge technology
-
Store...
|
|
Kali Linux Network Scanning Cookbook
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
About This Book
-
Learn the fundamentals behind commonly used scanning techniques
-
Deploy powerful scanning tools that are integrated into the Kali...
| | Misconceptions of Risk
The risk discipline is young and there are a number of ideas, perspectives and conceptions of risk out there. A number of such common conceptions of risk are examined in the book, related to the risk concept, risk assessments, uncertainty analyses, risk perception, the precautionary principle, risk management and decision making under... | | Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... |
|
Think Java: How to Think Like a Computer Scientist
Currently used at many colleges, universities, and high schools, this hands-on introduction to computer science is ideal for people with little or no programming experience. The goal of this concise book is not just to teach you Java, but to help you think like a computer scientist. You’ll learn how to program—a useful... | | Enterprise Risk Management: From Incentives to Controls
A fully revised second edition focused on the best practices of enterprise risk management
Since the first edition of Enterprise Risk Management: From Incentives to Controls was published a decade ago, much has changed in the worlds of business and finance. That's why James Lam has returned with a new edition of... | | Pro Android 5
Pro Android 5 shows you how to build real-world and fun mobile apps using the Android 5 SDK. This book updates the best-selling Pro Android and covers everything from the fundamentals of building apps for smartphones, tablets, and embedded devices to advanced concepts such as custom components, multi-tasking,... |
|
|
|
Result Page: 497 496 495 494 493 492 491 490 489 488 487 486 485 484 483 482 481 480 479 |