Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effectiveness of Air Force Science and Technology Program Changes
Effectiveness of Air Force Science and Technology Program Changes

Under mandate of Section 253, Study and Report on Effectiveness of Air Force Science and Technology Program Changes, of the Fiscal Year 2002 National Defense Authorization Act (Public Law 107-107; U.S. Congress, 2001), the U.S. Air Force contracted with the National Research Council (NRC) to conduct the present study. In response,...

Real-Time Systems Design and Analysis
Real-Time Systems Design and Analysis
This book is an introduction to real-time systems. It is intended not as a cookbook,
but, rather, as a stimulus for thinking about hardware and software in a different
way. It is necessarily broader than deep. It is a survey book, designed to heighten
the reader’s awareness of real-time issues.

This book is the
...
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Thesis Projects: A Guide for Students in Computer Science and Information Systems
Thesis Projects: A Guide for Students in Computer Science and Information Systems
"The authors have written a short book for students doing final year projects in computer science and information systems. Because the authors are from Sweden, the details of the procedures and expectations will vary in other countries. However, in the hands of a discerning reader, this book could be useful at several levels, at many colleges...
Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age
Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age

With their ability to cross traditional boundaries and achieve a level of functionality greater than their component elements, mega-systems have helped corporations and government organizations around the world resolve complex challenges that they otherwise couldn’t address with stand-alone systems. Engineering Mega-Systems: The...

Project Management with the IBM(R) Rational Unified Process(R): Lessons From The Trenches
Project Management with the IBM(R) Rational Unified Process(R): Lessons From The Trenches
The Hands-On, Start-to-Finish Guide to Managing Software Projects with the IBM® Rational Unified Process®

 

This is the definitive guide to managing software development projects with the IBM Rational Unified Process (RUP®). Drawing on his...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the...
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)
Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)

With the fall of France in 1940, Germany suddenly had the opportunity to strike at poorly guarded Allied convoys. The Luftwaffe pressed into service the Fw-200 Condor, a plane that had originally been designed as a civilian airliner and the first plane to fly non-stop from Berlin to New York in 1938. After various modifications, the Fw-200...

Introduction to Forensic DNA Evidence for Criminal Justice Professionals
Introduction to Forensic DNA Evidence for Criminal Justice Professionals

The use of DNA profiling in forensic cases has been considered the most innovative technique in forensic science since fingerprinting, yet for those with limited scientific knowledge, understanding DNA enough to utilize it properly can be a daunting task. Introduction to Forensic DNA Evidence for Criminal Justice Professionals is...

Hack Proofing XML
Hack Proofing XML
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy