Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)
Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)

This volume conveys some of the surprises, puzzles and success stories in high-dimensional and complex data analysis and related fields. Its peer-reviewed contributions showcase recent advances in variable selection, estimation and prediction strategies for a host of useful models, as well as essential new developments in the field.

...

Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Java Game Development with LibGDX: From Beginner to Professional
Java Game Development with LibGDX: From Beginner to Professional
Learn to design and create video games using the Java programming language and the LibGDX software library. Working through the examples in this book, you will create 12 game prototypes in a variety of popular genres, from collection-based and shoot-em-up arcade games to side-scrolling platformers and sword-fighting adventure games....
A First Look at SQL Server 2005 for Developers
A First Look at SQL Server 2005 for Developers
Sql server 2005 contains features that constitute the biggest
change since the internal server rewrite of SQL Server 7. This is true
from both programmability and data model viewpoints. This chapter
describes SQL Server 2005 in terms of .NET programmability, SQL:1999
compliance, user-defined types (UDTs), and XML integration to
...
Six Sigma and Beyond: Statistical Process Control, Volume IV
Six Sigma and Beyond: Statistical Process Control, Volume IV
This guide introduces the statistical process control (SPC) methodology for collecting data, arranging data in a chart or graph form, and interpreting the data to reduce variations in the process.

Features

  • Provides an overview of SPC in very simple, easily understood terms
  • Reviews and explains traditional...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

Microsoft Office Live For Dummies (Computer/Tech)
Microsoft Office Live For Dummies (Computer/Tech)
Automate common tasks like managing projects, customers, and documents

The fun and easy way to share your data online and grow your business

Want to make Office Live work for you? Now you can get up and running quickly in all the basics with this nuts-and-bolts guide. From creating a Web site...

Multimedia Systems and Content-Based Image Retrieval
Multimedia Systems and Content-Based Image Retrieval
Multimedia systems and content-based image retrieval are very important areas of research in computer technology. Numerous research works are being done in these fields at present. These two areas are changing our life-styles because they together cover creation, maintenance, accessing and retrieval of video, audio, image, textual and graphic...
unlimited object storage image
Result Page: 725 724 723 722 721 720 719 718 717 716 715 714 713 712 711 710 709 708 707 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy