Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Microsoft  Office XP Developer's Guide (Pro-Developer)
Microsoft Office XP Developer's Guide (Pro-Developer)
Exploit powerfully enhanced programmability in Office XP with authoritative information-straight from the Microsoft Office development team. This hardcore programming reference comes packed with practical, roll-up-your-sleeves resources to help you maximize your productivity with development tools for Microsoft Office, including the Microsoft...
Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Visual Data Mining: Techniques and Tools for Data Visualization and Mining

Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems

Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...

Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
The authors have consolidated their research work in this volume titled Soft Computing for Data Mining Applications. The monograph gives an insight into the research in the ?elds of Data Mining in combination with Soft Computing methodologies. In these days, the data continues to grow - ponentially. Much of the data is implicitly or explicitly...
Java Garage
Java Garage

Enter your Java Garage... where you do your work, not somebody else's. It's where you experiment, escape, tinker, and ultimately succeed.

Java Garage is not your typical Java book. If you're tired of monotonous "feature walks"...

Programming Distributed Applications With Com & Microsoft Visual Basic 6.0
Programming Distributed Applications With Com & Microsoft Visual Basic 6.0
Microsoft's DCOM is the key technology for enterprise development for the Windows platform. Written for the working Visual Basic developer or project manager, Programming Distributed Applications with COM and Microsoft Visual Basic 6.0 introduces the basics of DCOM objects in a clear style. All examples are written in Visual Basic, and the...
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

The Art of Profitability
The Art of Profitability
'Interesting, concise... This little book packs quite a punch.' - Miami Herald

What do Barbie dolls, Nokia phones, and American Express credit cards have in common? They all represent a powerful business model called pyramid profit. How about Intel, Microsoft, and Stephen King? They all exploit another model called value chain
...
Embedded SoPC Design with Nios II Processor and Verilog Examples
Embedded SoPC Design with Nios II Processor and Verilog Examples

Explores the unique hardware programmability of FPGA-basedembedded systems, using a learn-by-doing approach to introduce theconcepts and techniques for embedded SoPC design with Verilog

An SoPC (system on a programmable chip) integrates a processor,memory modules, I/O peripherals, and custom hardware acceleratorsinto a single FPGA...

Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy