Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies,...

SHARKS in the MOAT: How to Create Truly Secure Software
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
Security for Software Engineers
Security for Software Engineers

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

The book explores the key areas of attack...

An Introduction to Numerical Methods: A MATLAB® Approach, Fourth Edition
An Introduction to Numerical Methods: A MATLAB® Approach, Fourth Edition

Previous editions of this popular textbook offered an accessible and practical introduction to numerical analysis. An Introduction to Numerical Methods: A MATLAB® Approach, Fourth Edition continues to present a wide range of useful and important algorithms for scientific and engineering applications. The authors...

Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
Communications and Networking: 13th EAI International Conference, ChinaCom 2018, Chengdu, China, October 23-25, 2018, Proceedings (Lecture Notes of ... and Telecommunications Engineering)
The book constitutes the refereed proceedings of the 13th EAI International Conference on Communications and Networking, held in October 2018 in Chengdu, China. The 71 papers presented were carefully selected from 114 submissions. The papers are organized in topical sections on wireless communications and networking, next...
The Mind of an Engineer: Volume 2
The Mind of an Engineer: Volume 2
This book is a collection of chapters reflecting the experiences and achievements of some of the Fellows of the Indian National Academy of Engineering (INAE). The book comprises essays that look at reminiscences, eureka moments, inspirations, challenges and opportunities in the journey of an engineering professional. The chapters look at the...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IX: Aging, Gender and Work, Anthropometry, Ergonomics ... in Intelligent Systems and Computing)
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IX: Aging, Gender and Work, Anthropometry, Ergonomics ... in Intelligent Systems and Computing)

This book presents the proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018), held on August 26-30, 2018, in Florence, Italy. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including...

Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
This is the first book which exploits concepts and tools of global nonlinear dynamics for bridging the gap between theoretical and practical stability of systems/structures, and for possibly enhancing the engineering design in macro-, micro- and nano-mechanics. Addressed topics include complementing theoretical and practical stability to achieve...
Design Sensitivity Analysis and Optimization of Electromagnetic Systems (Mathematical and Analytical Techniques with Applications to Engineering)
Design Sensitivity Analysis and Optimization of Electromagnetic Systems (Mathematical and Analytical Techniques with Applications to Engineering)

This book presents a comprehensive introduction to design sensitivity analysis theory as applied to electromagnetic systems. It treats the subject in a unified manner, providing numerical methods and design examples. The specific focus is on continuum design sensitivity analysis, which offers significant advantages over discrete...

Result Page: 397 396 395 394 393 392 391 390 389 388 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy