Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Coding Games in Scratch: A Step-by-Step Visual Guide to Building Your Own Computer Games
Coding Games in Scratch: A Step-by-Step Visual Guide to Building Your Own Computer Games

Written for children ages 8–12 with little to no coding experience, this straightforward visual guide uses fun graphics and easy-to-follow instructions to show young learners how to build their own computer projects using Scratch, a popular free programming language.

With Coding Games in Scratch, kids can build single...

George Silverman's Explanation
George Silverman's Explanation
WHAT do I know of Hoghton Towers? Very little; for I have been gratefully unwilling to disturb my first impressions. A house, centuries old, on high ground a mile or so removed from the road between Preston and Blackburn, where the first James of England, in his hurry to make money by making baronets, perhaps made some of those remunerative...
Voice Over IPv6: Architectures for Next Generation VoIP Networks
Voice Over IPv6: Architectures for Next Generation VoIP Networks
IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.

IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater
...
Foundations of Analog and Digital Electronic Circuits (The Morgan Kaufmann Series in Computer Architecture and Design)
Foundations of Analog and Digital Electronic Circuits (The Morgan Kaufmann Series in Computer Architecture and Design)

The book issued by two professors at MIT is intended to initiate a new approach in presenting and developing analog and digital electronics. Traditionally, analog and digital elements and circuits are given in separate courses. Here, the authors want to show that in presenting both topics (analog and digital), a deeper insight of the real...

Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Advances in Evolutionary Algorithms: Theory, Design and Practice
Advances in Evolutionary Algorithms: Theory, Design and Practice
The goal of this book is to develop efficient optimization algorithms to solve diverse real-world problems of graded difficulty. Genetic and evolutionary mechanisms have been deployed for reaching the goal.

This book has made five significant contributions in the realm of genetic and evolutionary computation (GEC).

Practical
...
The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Buying a Computer for Dummies, 2005 Edition
Buying a Computer for Dummies, 2005 Edition
CPU, Ghz, Mhz, DIMMS, RAM, ROM, AGP, ISA, PCI, USB, CRT, LCD, NIC, CCD, CIS, DP, Kbps. What do all of these acronyms mean?

Are you baffled by computer technology and technology? Intimidated by computer salespeople who grimace or grin when you say “gizmo?” Buying a Computer For Dummies 2005 Edition gives you the ABCs of...

Wherever the Sound Takes You: Heroics and Heartbreak in Music Making
Wherever the Sound Takes You: Heroics and Heartbreak in Music Making
David Rowell is a professional journalist and an impassioned amateur musician. He’s spent decades behind a drum kit, pondering the musical relationship between equipment and emotion. In Wherever the Sound Takes You, he explores the essence of music’s meaning with a vast spectrum of players, trying to understand...
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Sensitivity Analysis for Neural Networks (Natural Computing Series)
Sensitivity Analysis for Neural Networks (Natural Computing Series)

Artificial neural networks are used to model systems that receive inputs and produce outputs. The relationships between the inputs and outputs and the representation parameters are critical issues in the design of related engineering systems, and sensitivity analysis concerns methods for analyzing these relationships. Perturbations of neural...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy