Home | Amazing | Today | Tags | Publishers | Years | Search 
Visual Basic 2012 Programmer's Reference
Visual Basic 2012 Programmer's Reference
IT HAS BEEN SAID THAT SIR ISAAC NEWTON was the last person to know everything. He was an accomplished physicist (his three laws of motion were the basis of classical mechanics, which defi ned astrophysics for three centuries), mathematician (he was one of the inventors of calculus and developed Newton’s Method for fi nding...
Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
Language and Automata Theory and Applications: 5th International Conference
Language and Automata Theory and Applications: 5th International Conference
These proceedings contain the papers that were presented at the 5th International Conference on Language and Automata Theory and Applications (LATA 2011), held in Tarragona, Spain, during May 26–31, 2011.

The scope of LATA is rather broad, including: algebraic language theory; algorithms for semi-structured
...
e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
The present book includes extended and revised versions of a set of selected best papers from the 6th International Joint Conference on e-Business and Telecommunications (ICETE), which was held in July 2009, in Milan, Italy. This conference reflects a continuing effort to increase the dissemination of recent research results...
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on Current Trends in Theory and Practice of Computer Science, Nov? Smokovec
SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on Current Trends in Theory and Practice of Computer Science, Nov? Smokovec

This book constitutes the refereed proceedings of the 34th Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2008, held in Slovakia, in 2008. The 57 revised full papers, presented together with 10 invited contributions, were carefully reviewed and selected from 162 submissions. The contributions are segmented...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Algorithms Unlocked
Algorithms Unlocked

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves...

CISSP Training Kit
CISSP Training Kit

Your 2-in-1 Self-Paced Training Kit

EXAM PREP GUIDE

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you’ve learned by applying
...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy