Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
College Algebra Demystified
College Algebra Demystified

A BETTER WAY TO COLLEGE ALGEBRA X-PERTISE

One of the most valuable tools acquired in a university education, college algebra is essential for courses from the sciences to computing, engineering to mathematics. It can help you do better on placement exams, even before college, and it's useful in solving the computations...

Digital Signal Processing: A Computer-Based Approach, 2e with DSP Laboratory using MATLAB
Digital Signal Processing: A Computer-Based Approach, 2e with DSP Laboratory using MATLAB

"Digital Signal Processing: A Computer-Based Approach" is intended for a two-semester course on digital signal processing for seniors or first-year graduate students. Based on user feedback, a number of new topics have been added to the second edition, while some excess topics from the first edition have been removed. The author has...

Introduction to Linear Algebra
Introduction to Linear Algebra

Linear Algebra with Applications is an introductory text targeted to second or advanced first year undergraduates in engineering or mathematics. The organization of this text is motivated by the authors' experience which tells them what essential concepts should be mastered by students in a one semester undergraduate Linear Algebra...

Creating a Presentation in PowerPoint: Visual QuickProject Guide
Creating a Presentation in PowerPoint: Visual QuickProject Guide
PowerPoint is nearly ubiquitous in today's world--in business settings, of course, but in schools and universities, clubs and organizations--almost everywhere you turn. It's not a difficult tool to use, but the presentations people create in PowerPoint range widely in quality--dazzling or dull, enlivening or enervating. Now, to help users deliver...
On the Brink of Paradox: Highlights from the Intersection of Philosophy and Mathematics (The MIT Press)
On the Brink of Paradox: Highlights from the Intersection of Philosophy and Mathematics (The MIT Press)
An introduction to awe-inspiring ideas at the brink of paradox: infinities of different sizes, time travel, probability and measure theory, and computability theory.


This award-winning book introduces the reader to awe-inspiring issues at the intersection of philosophy and mathematics. It explores ideas at the
...
Complex Digital Circuits
Complex Digital Circuits

This textbook is designed for a second course on digital systems, focused on the design of digital circuits.  It was originally designed to accompany a MOOC (Massive Open Online Course) created at the Autonomous University of Barcelona (UAB), currently available on the Coursera platform.  Readers will learn to develop...

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences
  • ...
Advanced Statistics Demystified
Advanced Statistics Demystified

TAKE THE "MEAN" OUT OF ADVANCED STATISTICS

Now anyone who has mastered basic statistics can easily take the next step up. In Advanced Statistics Demystified, experienced statistics instructor Larry J. Stephens provides an effective, anxiety-soothing, and totally painless way to learn advanced statistics --...

Yet Another Introduction to Dark Matter: The Particle Physics Approach (Lecture Notes in Physics)
Yet Another Introduction to Dark Matter: The Particle Physics Approach (Lecture Notes in Physics)

Dark matter is a frequently discussed topic in contemporary particle physics. Written strictly in the language of particle physics and quantum field theory, these course-based lecture notes focus on a set of standard calculations that students need in order to understand weakly interacting dark matter candidates.

After...

Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Python Crash Course is a fast-paced, thorough introduction to Python that will have you writing programs, solving problems, and making things that work in no time.

In the first half of the book, you’ll learn about basic programming concepts, such as lists, dictionaries, classes, and loops, and practice writing
...
unlimited object storage image
Result Page: 289 288 287 286 285 284 283 282 281 280 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy