Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Ageing And Pension Reform Around The World: Evidence From Eleven Countries
Ageing And Pension Reform Around The World: Evidence From Eleven Countries
Population ageing and the resulting pressures on existing pension systems constitutes one of the most important challenges modern societies will have to face over the coming decades. Although governments have responded to such pressures by adopting a plethora of pension reforms, the adaptation process is far from over. This book comprehensively...
Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

Fuzzy Logic with Engineering Applications
Fuzzy Logic with Engineering Applications

Fuzzy logic is a simple phrase that actually refers to a large subject dealing with a set of methods to characterize and quantify uncertainty in engineering systems that arise from ambiguity, imprecision, fuzziness, and lack of knowledge.

This 15-chapter textbook remains the only major text that can be used for both undergraduate...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

CCENT Exam Cram (exam 640-822)
CCENT Exam Cram (exam 640-822)
This book includes a CD-ROM that features:
  • Complete coverage of CCENT exam objectives
  • Realistic exam questions for effective practice
  • Detailed explanations of correct and incorrect answers
  • Multiple exam modes
  • Flash Card format
  • An electronic copy of the book
  • ...
Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
Radar Cross Section, 2nd Edition (Scitech Radar and Defense)
Radar Cross Section, 2nd Edition (Scitech Radar and Defense)
This is the second edition of the first and foremost book on this subject for self-study, training, and course work. Radar cross section (RCS) is a comparison of two radar signal strengths. One is the strength of the radar beam sweeping over a target, the other is the strength of the reflected echo sensed by the receiver. This book shows how the...
Bacteriocins: Ecology and Evolution
Bacteriocins: Ecology and Evolution
Microbes produce an extraordinary array of defense systems. These include bacteriocins, a class of antimicrobial molecules with narrow killing spectra, produced by bacteria. The book describes the diversity and ecological role of bacteriocins of Gram-positive and Gram-negative bacteria, presenting a new classification scheme for the former and a...
Create Mobile Games with Corona: Build with Lua on iOS and Android
Create Mobile Games with Corona: Build with Lua on iOS and Android

Printed in full color.

Develop cross-platform mobile games with Corona using the Lua programming language! Corona is experiencing explosive growth among mobile game developers, and this book gets you up to speed on how to use this versatile platform. You'll use the Corona SDK to simplify game programming and take a
...

FXRuby: Create Lean and Mean GUIs with Ruby
FXRuby: Create Lean and Mean GUIs with Ruby
FXRuby is a highly object-oriented toolkit for building lean, mean, cross-platform graphical user interfaces in Ruby. Since its initial release in 2001, FXRuby has become one of the most popular GUI choices for Ruby developers. This book is your best resource for rapidly learning how to develop powerful, sophisticated GUIs in your favorite...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy