Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Resource Allocation in Wireless Networks: Theory and Algorithms
Resource Allocation in Wireless Networks: Theory and Algorithms

The wireless industry is in the midst of a fundamental shift from providing voice-only services to offering customers an array of multimedia services, including a wide variety of audio, video and data communications capabilities. Future wireless networks will be integrated into every aspect of daily life, and therefore could affect our life...

The Book of F#: Breaking Free with Managed Functional Programming
The Book of F#: Breaking Free with Managed Functional Programming

F# brings the power of functional-first programming to the .NET Framework, a platform for developing software in the Microsoft Windows ecosystem. If you're a traditional .NET developer used to C# and Visual Basic, discovering F# will be a revelation that will change how you code, and how you think about coding.

In...

Scientific Computing with Multicore and Accelerators (Chapman & Hall/CRC Computational Science)
Scientific Computing with Multicore and Accelerators (Chapman & Hall/CRC Computational Science)

The hybrid/heterogeneous nature of future microprocessors and large high-performance computing systems will result in a reliance on two major types of components: multicore/manycore central processing units and special purpose hardware/massively parallel accelerators. While these technologies have numerous benefits, they also pose substantial...

Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

JSF 2.0 Cookbook
JSF 2.0 Cookbook

JavaServer Faces is a Java-based Web application framework intended to simplify development of user interfaces for Java EE applications. You may already be aware of the laborious search through reference guides and documentation to develop your JSF applications. With the JSF Cookbook, you can find solutions to the most common JSF problems in...

The Sensible Guide to Forex: Safer, Smarter Ways to Survive and Prosper from the Start
The Sensible Guide to Forex: Safer, Smarter Ways to Survive and Prosper from the Start

FXstreet.Com’s 2013 Best Book Award!

The Sensible Guide to Forex: Safer, Smarter Ways to Survive and Prosper from the Start is written for the risk averse, mainstream retail investor or trader seeking a more effective way to tap forex markets to improve returns and hedge currency risk. As the most...

Mastering UDK Game Development
Mastering UDK Game Development

Eight projects specifically designed to help you exploit the Unreal Development Kit to its full potential

Overview

  • Guides you through advanced projects that help augment your skills with UDK by practical example.
  • Comes complete with all the art assets and additional resources that you need...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Perl Power!: A JumpStart Guide to Programming with Perl 5
Perl Power!: A JumpStart Guide to Programming with Perl 5

After the two successful years that this book has been available in German-speaking countries, the publishers decided to translate it into English and allow me the opportunity to address not only my German countrymen but savvy Perl programmers throughout the world!

This book has come a long way since it was first published: it was...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy