Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Filters: Principles and Applications with MATLAB (IEEE Series on Digital & Mobile Communication)
Digital Filters: Principles and Applications with MATLAB (IEEE Series on Digital & Mobile Communication)
The history of digital filters essentially began in the mid - 1970s, concurrent with the advent of the fi eld of study called digital signal processing (DSP). Over the ensuing 30 something years, digital filters have become both a facilitating and enabling technology. They serve as analog replacements as well as serving in unique...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Wiki at War: Conflict in a Socially Networked World
Wiki at War: Conflict in a Socially Networked World
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide
...
Intelligent Complex Adaptive Systems
Intelligent Complex Adaptive Systems
I don’t believe in the existence of a complex systems theory as such and, so far, I’m still referring to complex systems science (CSS) in order to describe my research endeavours. In my view, the latter is constituted, up until now, by a bundle of loosely connected methods and theories aiming to observe— from...
Handbook of RF and Microwave Power Amplifiers (The Cambridge RF and Microwave Engineering Series)
Handbook of RF and Microwave Power Amplifiers (The Cambridge RF and Microwave Engineering Series)
In 1989, I was responsible for organizing a workshop at the European Microwave Conference on High-Power Solid State Amplifiers. This workshop proved popular and so Artech House asked me to persuade the speakers to turn their material into a formsuitable for publication, the result was the book entitled “High-Power GaAs FET...
Cytokines and Chemokines in Infectious Diseases Handbook (Infectious Disease)
Cytokines and Chemokines in Infectious Diseases Handbook (Infectious Disease)
Cytokines and chemokines are an important class of effector molecules that play a fundamental role in orchestrating the innate and acquired immune responses needed to eliminate or wall off invading pathogens. In vitro and in vivo studies have been instrumental in revealing the complexity of the cytokine network and the many facets of...
Test and Measurement: Know It All (Newnes Know It All)
Test and Measurement: Know It All (Newnes Know It All)

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

Field Application engineers need to master a wide area of
...

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Web Application Defender's Cookbook: Battling Hackers and Protecting Users

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy