Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Java EE 6 with GlassFish 3 Application Server
Java EE 6 with GlassFish 3 Application Server

This book is a practical guide with a very user-friendly approach. It aims to speed up the reader in Java EE 6 development. All major Java EE 6 APIs and the details of the GlassFish 3 server are covered followed by examples of its use. If you are a Java developer and wish to become proficient with Java EE 6, then this book is for you. You are...

Quantitative Methods in Project Management
Quantitative Methods in Project Management
This book combines theoretical and practical applications and takes project managers through the most important quantitative methods, integrates them, and illustrates interrelationships.

This is a practitioner’s book, combining theoretical and practical applications for project professionals. It is a loosely coupled work flow that...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

The Stand: Expanded Edition: For the First Time Complete and Uncut
The Stand: Expanded Edition: For the First Time Complete and Uncut

This is the way the world ends: with a nanosecond of computer error in a Defense Department laboratory and a million casual contacts that form the links in a chain letter of death.

And here is the bleak new world of the day after: a world stripped of its institutions and emptied of 99 percent of its people. A world in which a handful
...

FPGAs 101: Everything you need to know to get started
FPGAs 101: Everything you need to know to get started

FPGAs (Field-Programmable Gate Arrays) can be found in applications such as smart phones, mp3 players, medical imaging devices, and for aerospace and defense technology. FPGAs consist of logic blocks and programmable interconnects. This allows an engineer to start with a blank slate and program the FPGA for a specific task, for instance,...

Compiler Specification and Verification (Lecture Notes in Computer Science)
Compiler Specification and Verification (Lecture Notes in Computer Science)

About four years ago David Luckham hinted to me the possibility of verifying a "real" compiler. At that time the idea seemed unrealistic, even absurd. After looking closer at the problem and getting more familiar with the possibilities of the Stanford verifier a verified compiler appeared not so impossible after all. In...

Micronutrients and HIV Infection (Modern Nutrition)
Micronutrients and HIV Infection (Modern Nutrition)

Analogous to other infections, evidence suggests that improved micronutrient intake may reduce HIV transmission and progression, as well as morbidity from common and opportunistic infections. This is important information, considering many in the world's HIV-infected population do not yet have access to anti-retroviral drugs....

Testing SAP R/3: A Manager's Step-by-Step Guide
Testing SAP R/3: A Manager's Step-by-Step Guide

Destined to become your essential SAP R/3 desktop reference

Testing SAP R/3: A Manager′s Step–by–Step Guide demystifies this powerful software to enable professionals to implement a disciplined, efficient, and proven approach for testing SAP R/3. Providing much needed industry guidance for...

Ninja Mind Control
Ninja Mind Control
Now you can unlock the ancient secrets of Ninja mind control and discover for yourself the fantastic powers of the legendary Ninja warriors. By combining simple methods of meditation with aggressive maneuvers, you can become the master of any situation--from the author of Ninja Secrets of Invisibility.

NINJA MIND CONTROL is, without
...
Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy