Home | Amazing | Today | Tags | Publishers | Years | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Getting StartED with Netbooks
Getting StartED with Netbooks

Getting StartED with Netbooks broadly targets consumers at a pivotal moment in the explosive growth of the MID/Netbook/UMPC market. We intend to create value for this group by providing an indispensable, "Consumer Reports Meets Whole Earth Catalog" sort of information aggregation.

For this project, timing and tone...

Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies
Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies

As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their application in social contexts for knowledge, learning, and human development.

Semantic Web and Knowledge Management has been accepted as a critical enabler aiming to increase knowledge-related performance...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

The Social Media Business Equation
The Social Media Business Equation

My journey down the social media road began years ago, and many people have praised me for my foresight and brilliance. They are very kind, but the truth is, what really took me down this road was desperation. A few years ago—perhaps you remember—the economy took a heck of a dip. On its way down, it punched me in the...

Speech Processing and Soft Computing
Speech Processing and Soft Computing

Soft Computing (SC) techniques have been recognized nowadays as attractive solutions for modeling highly nonlinear or partially defined complex systems and processes. These techniques resemble biological processes more closely than conventional (more formal) techniques. However, despite its increasing popularity, soft computing lacks...

Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches
Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches

Since the first part of the twentieth century, cybernetics and systems research have been developed as scientific disciplines. Investigations, launched in the area of cybernetics, previously dealt with control and information processing. In a more narrow sense, they consisted in the consideration of analogies of the control and the...

Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

Beginning Microsoft Visual Studio LightSwitch Development (Wrox Programmer to Programmer)
Beginning Microsoft Visual Studio LightSwitch Development (Wrox Programmer to Programmer)

TO THOSE OF US WHO PAY ATTENTION to such things, the world of software development has changed a lot in the last few years. In the .NET world, Microsoft’s Visual Studio 2010 is undoubtedly the most successful development environment. Since the release of the fi rst .NET version in February 2002, this product has undergone dramatic...

Semantic Web Services
Semantic Web Services

All students interested in researching the Internet are living in very interesting and exciting times. From the Internet’s beginning in the 1960s up to the present day, the Internet has grown to become a vast platform where there are now 2 billion users of this global infrastructure.1 Predictions are that this number will rise to...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy