Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Data Mining and Knowledge Discovery Approaches Based on Rule Induction Techniques (Massive Computing)
Data Mining and Knowledge Discovery Approaches Based on Rule Induction Techniques (Massive Computing)

This book will give the reader a perspective into the core theory and practice of data mining and knowledge discovery (DM and KD). Its chapters combine many theoretical foundations for various DM and KD methods, and they present a rich array of examples – many of which are drawn from real-life applications. Most of the theoretical...

Real Astronomy with Small Telescopes: Step-by-Step Activities for Discovery (Patrick Moore's Practical Astronomy Series)
Real Astronomy with Small Telescopes: Step-by-Step Activities for Discovery (Patrick Moore's Practical Astronomy Series)
From the reviews:

"The dozens of projects collected here are a combination of observations suitable for current research (such as classifying sun-spots or monitoring binary stars) and recreating classic experiments (such as determining the speed of light by timing Jupiter’s moons). … Besides ample nuggets for science projects,...

Einstein, Physics and Reality
Einstein, Physics and Reality

Albert Einstein was one of the principal founders of the quantum and relativity theories. Until 1925, when the Bose-Einstein statistics was discovered, he made great contributions to the foundations of quantum theory. However, after the discovery of quantum mechanics by Heisenberg and wave mechanics by Schrodinger, with the consequent...

Imaging in Drug Discovery and Early Clinical Trials (Progress in Drug Research)
Imaging in Drug Discovery and Early Clinical Trials (Progress in Drug Research)

This monograph examines the contribution of imaging modalities to the stages of drug discovery and development, from early target validation to their use in clinical development programs. Chapters are devoted to the description of the drug discovery process, to the various imaging modalities preclinically and clinically, to applications of...

Understanding Sleep and Dreaming (Springerlink Behavioral Science)
Understanding Sleep and Dreaming (Springerlink Behavioral Science)
As I am writing this, I am anticipating the 50th anniversary o f tlie discovery o f RELMS. For it was in 1951 that Aserinsky and Kleitman, who, while electronically recording a person's sleep in a University o f Chicago lab, were surprised to notice that eye movements occurred periodically even when their s~tbjectw as, by all...
MAKE: Electronics: Learning Through Discovery
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the...
Microsoft Windows PowerShell 3.0 Firstlook
Microsoft Windows PowerShell 3.0 Firstlook
With PowerShell quickly becoming the de-facto standard for automation, on the Windows platform, it is becoming a necessity to learn and understand the language. Microsoft Windows PowerShell 3.0 First Look will ensure that you have a great overview of the numerous new features and changes found in the most recent version of the...
The Attractor Factor: 5 Easy Steps for Creating Wealth (or Anything Else) from the Inside Out
The Attractor Factor: 5 Easy Steps for Creating Wealth (or Anything Else) from the Inside Out

In The Attractor Factor, Joe Vitale combines principles of spiritual self-discovery with proven marketing concepts to show how anyone can live a happy life in and outside of business. He shares his own quest for wealth and success while leading you through the five simple steps that will make all your aspirations, professional and...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Advanced Web Technologies and Applications
Advanced Web Technologies and Applications
This book constitutes the refereed proceedings of the 6th Asia-Pacific Web Conference, APWeb 2004, held in Hangzhou, China, in April 2004.

The 60 revised full papers, 24 revised short papers, 15 revised poster papers, and 3 revised industrial papers presented together with 3 keynote papers and 3 invited papers were carefully reviewed and...

Kernel Methods for Pattern Analysis
Kernel Methods for Pattern Analysis
'Kernel methods form an important aspect of modern pattern analysis, and this book gives a lively and timely account of such methods. ... if you want to get a good idea of the current research in this field, this book cannot be ignored.' SIAM Review '... the book provides an excellent overview of this growing field. I highly recommend it to those...
unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy