Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Planetary Cartography and GIS (Lecture Notes in Geoinformation and Cartography)
Planetary Cartography and GIS (Lecture Notes in Geoinformation and Cartography)

This book approaches geological, geomorphological and topographical mapping from the point in the workflow at which science-ready datasets are available. Though there have been many individual projects on dynamic maps and online GISs, in which coding and data processing are given precedence over cartographic principles, cartography...

Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

Adaptive Antennas and Receivers (Electrical and Computer Enginee)
Adaptive Antennas and Receivers (Electrical and Computer Enginee)
In our modern age of remote sensing, wireless communication, and the nearly endless list of other antenna-based applications, complex problems require increasingly sophisticated solutions. Conventional antenna systems are no longer suited to high-noise or low-signal applications such as intrusion detection. Detailing highly effective approaches to...
Adaptive Image Processing: A Computational Intelligence Perspective, Second Edition
Adaptive Image Processing: A Computational Intelligence Perspective, Second Edition

Illustrating essential aspects of adaptive image processing from a computational intelligence viewpoint, the second edition of Adaptive Image Processing: A Computational Intelligence Perspective provides an authoritative and detailed account of computational intelligence (CI) methods and algorithms for adaptive image...

Data Mining: Opportunities and Challenges
Data Mining: Opportunities and Challenges
An overview of the multidisciplinary field of data mining, this book focuses specifically on new methodologies and case studies. Included are case studies written by 44 leading scientists and talented young scholars from seven different countries. Topics covered include data mining based on rough sets, the impact of missing data, and mining free...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33
Fish Physiology: Organic Chemical Toxicology of Fishes, Volume 33: Fish Physiology Volume 33

Fish Physiology: Organic Chemical Toxicology of Fishes discusses the different types of organic chemical contaminants and their respective toxic effects in fish. The book also covers the detection of dissolved organic compounds and methods to assess organic toxicity. Substances addressed in this book include organometallics,...

WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
Highly regarded as the book on the air interface of 3G cellular systems WCDMA for UMTS has again been fully revised and updated. The third edition now covers the key features of 3GPP Release 6 ensuring it remains the leading principal resource in this constantly progressing area.

By providing a deep understanding of the...

CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network
CAMEL: Intelligent Networks for the GSM, GPRS and UMTS Network

Learn how to use CAMEL to transfer the Intelligent Network concept to the mobile world!

CAMEL (Customized Application for the Mobile network Enhanced Logic) is a standard for Intelligent Networks for mobile communications networks.  It is currently deployed in all regions of the world, enabling mobile network...

Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy