Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Quantum Computer Science (Synthesis Lectures on Quantum Computing)
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)

Tensor Product Model Transformation in Polytopic Model-Based Control offers a new perspective of control system design. Instead of relying solely on the formulation of more effective LMIs, which is the widely adopted approach in existing LMI-related studies, this cutting-edge book calls for a systematic modification and...

Managing Time in Relational Databases: How to Design, Update and Query Temporal Data
Managing Time in Relational Databases: How to Design, Update and Query Temporal Data

Managing Time in Relational Databases shows how to make the rich information content of bi-temporal data available to business users, while simplifying the design, maintenance and retrieval of that data. Metadata declarations eliminate the need to directly model temporal data. Temporal data maintenance is isolated in code that...

A Practical Guide to Data Structures and Algorithms using Java
A Practical Guide to Data Structures and Algorithms using Java

Although traditional texts present isolated algorithms and data structures, they do not provide a unifying structure and offer little guidance on how to appropriately select among them. Furthermore, these texts furnish little, if any, source code and leave many of the more difficult aspects of the implementation as exercises. A fresh...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum computationmay seem to be a topic for science fiction, but small quantum computers have existed for several years and larger machines are on the drawing table. These efforts have been fueled by a tantalizing property: while conventional computers employ a binary representation that allows computational power to scale linearly with resources...
SQL Server Advanced Data Types: JSON, XML, and Beyond
SQL Server Advanced Data Types: JSON, XML, and Beyond

SQL Server Advanced Data Types attempts to demystify the complex data types that are available to developers in modern versions of SQL Server. Over the last couple of years, I have noticed that many SQL developers have heard of each of the complex data types available in SQL Server but often avoid using them, as they are not sure how these...

xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.

xUnit Test Patterns is the...

Computational Fluid Dynamics in Practice
Computational Fluid Dynamics in Practice

Computational Fluid Dynamics in Practice explores the current and future developments in CFD, with the authors detailing advanced applications and case studies to demonstrate successes, illustrate the limitations, and identify methods for good practice. Designers, engineers, and researchers working in this field of fluid mechanics will...

Result Page: 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy