Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Netcentric System of Systems Engineering with DEVS Unified Process
Netcentric System of Systems Engineering with DEVS Unified Process

Addressing the new challenges that engineers face, this book presents fundamental concepts to help tackle the integration of modeling and simulation with command, and control systems of systems through the use of concepts and standards for interoperability and testing based on the Discrete Event Systems Specification Unified Process. The text...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Defining and Deploying Software Processes
Defining and Deploying Software Processes
I gravitated into the process world several years ago after performing
almost all roles in the software engineering environment — both as a
programmer and in various management positions. That environment
covered both the commercial software development world and the government
contracting software development world. I
...
Microsoft  Office Excel  2007 Step by Step
Microsoft Office Excel 2007 Step by Step
Excel provides an easy-to-use, powerful spreadsheet environment that helps you handle calculations and data more effectively. With Microsoft Office Excel 2007 Step by Step, youll learn all the ins and outs of working with Excel features, including the exciting new interface for this latest version of Office. This information-packed guide provides...
Pa-Kua: Chinese Boxing for Fitness & Self-Defense
Pa-Kua: Chinese Boxing for Fitness & Self-Defense

Originally published in 1967, Pa-Kua was the West’s first look into the esoteric Chinese martial arts. It has been a valued and sought after text ever since. It was put out of print in the 1970s, but since that time interest in the martial arts have continued to skyrocket. Pa-Kua gives an introduction to the little known...

Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Web Application Defender's Cookbook: Battling Hackers and Protecting Users

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you...

Getting a Big Data Job For Dummies
Getting a Big Data Job For Dummies

Hone your analytic talents and become part of the next big thing

Getting a Big Data Job For Dummies is the ultimate guide to landing a position in one of the fastest-growing fields in the modern economy. Learn exactly what "big data" means, why it's so important across all industries, and how you can...

IT Project Management Handbook
IT Project Management Handbook
Now you can manage IT projects quickly, easily, on time, and on budget!

IT project management has developed into a complex process with a broader scope of responsibilities than ever before. Here is the newest and most comprehensive book to offer winning insights and strategies on how to manage every step of the process. Written by two of this...

The Internet and American Business (History of Computing)
The Internet and American Business (History of Computing)

The effect of a commercialized Internet on American business, from the boom in e-commerce and adjustments by bricks-and-mortar businesses to file-sharing and community building.

When we think of the Internet, we generally think of Amazon, Google, Hotmail, Napster, MySpace, and a host of other sites for buying products, searching...

Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Handbook of RF and Microwave Power Amplifiers (The Cambridge RF and Microwave Engineering Series)
Handbook of RF and Microwave Power Amplifiers (The Cambridge RF and Microwave Engineering Series)
In 1989, I was responsible for organizing a workshop at the European Microwave Conference on High-Power Solid State Amplifiers. This workshop proved popular and so Artech House asked me to persuade the speakers to turn their material into a formsuitable for publication, the result was the book entitled “High-Power GaAs FET...
unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy