Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

The Nice and Accurate Good Omens TV Companion: Your guide to Armageddon and the series based on the bestselling novel by Terry Pratchett and Neil Gaiman
The Nice and Accurate Good Omens TV Companion: Your guide to Armageddon and the series based on the bestselling novel by Terry Pratchett and Neil Gaiman

A stunning full-color, illustrated, behind-the-scenes guide to the Good Omens television series, adapted for the screen by Neil Gaiman himself and starring Michael Sheen and David Tennant.

Following the original novel’s chronological structure—from “the Beginning” to “End
...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Go Web Programming
Go Web Programming

Summary

Go Web Programming teaches you how to build scalable, high-performance web applications in Go using modern design principles.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

...

Mathematical Programming: Theory and Methods
Mathematical Programming: Theory and Methods
This book is a result of my teaching mathematical programming to graduate students of the University of Delhi for over thirty years. In preparing this book, a special care has been made to see that it is self-contained and that it is suitable both as a text and as a reference.

The book is divided in three parts.
...
Algorithms and Data Structures: The Basic Toolbox
Algorithms and Data Structures: The Basic Toolbox
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic...
Migrants Before the Law: Contested Migration Control in Europe
Migrants Before the Law: Contested Migration Control in Europe
This book traces the practices of migration control and its contestation in the European migration regime in times of intense politicization. The collaboratively written work brings together the perspectives of state agents, NGOs, migrants with precarious legal status, and their support networks, collected through multi-sited fieldwork...
Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
Pro Excel Financial Modeling: Building Models for Technology Startups
Pro Excel Financial Modeling: Building Models for Technology Startups
Learn the business thinking behind financial modeling and execute what you know effectively using Microsoft Excel. Many believe that sales and profitability projections shown in financial models are the keys to success in attracting investors. The truth is that investors will come up with their own projections. The investor wants to understand the...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Model-Based Signal Processing (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
Model-Based Signal Processing (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
A unique treatment of signal processing using a model-based perspective

Signal processing is primarily aimed at extracting useful information, while rejecting the extraneous from noisy data. If signal levels are high, then basic techniques can be applied. However, low signal levels require using the underlying physics to correct the problem...

Result Page: 115 114 113 112 111 110 109 108 107 106 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy