Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Database Programming
Android Database Programming
Today, we live in an increasingly data-centric and data-driven world. We live in a world where companies like Amazon track every item we view and every item we purchase so as to recommend similar products to us. We live in a world where companies like Google store every search query thrown at them so as to recommend better search queries in...
Programming C# 5.0: Building Windows 8, Web, and Desktop Applications for the .NET 4.5 Framework
Programming C# 5.0: Building Windows 8, Web, and Desktop Applications for the .NET 4.5 Framework

After a dozen years of incremental changes, C# has become one of the most versatile programming languages available. With this comprehensive guide, you’ll learn just how powerful the combination of C# 5.0 and .NET 4.5 can be. Author Ian Griffiths guides you through C# 5.0 fundamentals and teaches you techniques for building web...

The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.

This book is designed to empower you to:

* Understand
...
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Windows Server 2008 PKI and Certificate Security (PRO-Other)
Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and...
Symfony 1.3 Web Application Development
Symfony 1.3 Web Application Development
With its flexible architecture, the Symfony framework allows you to build modern web applications and web services easily and rapidly. The MVC components separate the logic from the user interface and therefore make developing, changing, and testing your applications much faster. Using Symfony you can minimize repetitive coding tasks, optimize...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Mechanical Reliability Improvement: Probability and Statistics for Experimental Testing
Mechanical Reliability Improvement: Probability and Statistics for Experimental Testing
Mechanical reliability analysis is no longer limited to a small collection of classical statistical analyses. The speed of the present generation of microcomputers makes it possible to program and evaluate alternative computerintensive analyses for each mechanical reliability application of specific interest. Thus computer-intensive analyses are...
Digital Control
Digital Control

Digital control systems are becoming increasingly prevalent and important within industry. In recent years significant progress has been made in their analysis and design – particularly within the areas of microprocessors and digital signal processors. The traditional approach to teaching digital control assumes an understanding of...

The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Microsoft  Office XP Developer's Guide (Pro-Developer)
Microsoft Office XP Developer's Guide (Pro-Developer)
Exploit powerfully enhanced programmability in Office XP with authoritative information-straight from the Microsoft Office development team. This hardcore programming reference comes packed with practical, roll-up-your-sleeves resources to help you maximize your productivity with development tools for Microsoft Office, including the Microsoft...
Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Visual Data Mining: Techniques and Tools for Data Visualization and Mining

Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy