Home | Amazing | Today | Tags | Publishers | Years | Search 
Software Engineering for Image Processing Systems (Image Processing Series)
Software Engineering for Image Processing Systems (Image Processing Series)

This book is not intended to be a traditional software engineering text — there are many good ones. Instead, it is designed specifically for those involved in image processing systems. It provides a modern engineering framework for the specification, design, coding, testing, and maintenance of image processing software and...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Compiler Specification and Verification (Lecture Notes in Computer Science)
Compiler Specification and Verification (Lecture Notes in Computer Science)

About four years ago David Luckham hinted to me the possibility of verifying a "real" compiler. At that time the idea seemed unrealistic, even absurd. After looking closer at the problem and getting more familiar with the possibilities of the Stanford verifier a verified compiler appeared not so impossible after all. In...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Ecological Modeling for Resource Management
Ecological Modeling for Resource Management

This book was developed from a workshop on the “Effective Use of Ecological Modeling in Management,” held in Oak Ridge, Tennessee, on October 23–26, 2000. The workshop was sponsored by the Department of Defense’s (DoD’s) Strategic Environmental Research and Development Program (SERDP), the Army Research...

Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011
Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011

This volume contains papers presented at the 8th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2011), held in Changsha, China, July 28-30. This conference followed MDAI 2004 (Barcelona, Catalonia, Spain),MDAI 2005 (Tsukuba, Japan),MDAI 2006 (Tarragona,Catalonia, Spain), MDAI 2007 (Kitakyushu,...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy