Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science
Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science
This book describes the vast opportunity created by unifying science and integrating technology, and recommends transforming ideas for individuals and society. We stand at the threshold of a new renaissance in knowledge based on the structure and behavior of matter from the nanoscale up to the most complex system yet discovered, the human brain....
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Software Engineering for Image Processing Systems (Image Processing Series)
Software Engineering for Image Processing Systems (Image Processing Series)

This book is not intended to be a traditional software engineering text — there are many good ones. Instead, it is designed specifically for those involved in image processing systems. It provides a modern engineering framework for the specification, design, coding, testing, and maintenance of image processing software and...

Broadband Network Architectures: Designing and Deploying Triple-Play Services
Broadband Network Architectures: Designing and Deploying Triple-Play Services
“Network professionals who are looking to deploy triple-play service provider networks will find this book a useful tool.”

–Michael Newbery, IP Architect, TelstraClear Limited

 

“This book provides a wealth of information on current and...

Game Programming Algorithms and Techniques: A Platform-Agnostic Approach (Game Design/Usability)
Game Programming Algorithms and Techniques: A Platform-Agnostic Approach (Game Design/Usability)

Game Programming Algorithms and Techniques is a detailed overview of many of the important algorithms and techniques used in video game programming today. Designed for programmers who are familiar with object-oriented programming and basic data structures, this book focuses on practical concepts that see actual use in the...

Python Game Programming by Example
Python Game Programming by Example

A pragmatic guide for developing your own games with Python

About This Book

  • Strengthen your fundamentals of game programming with Python language
  • Seven hands-on games to create 2D and 3D games rapidly from scratch
  • Illustrative guide to explore the different GUI libraries...
Knowledge Based Radar Detection, Tracking and Classification
Knowledge Based Radar Detection, Tracking and Classification
This book brings together the key concepts essential for the application of Knowledge Based Systems (KBS) to radar detection, tracking, classification, and scheduling. It highlights the latest advances in the field and forecasts the impact of KB technology on future systems, including civilian, military, and homeland defense applications....
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy