Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Probabilistic Methods for Algorithmic Discrete Mathematics (Algorithms and Combinatorics)
Probabilistic Methods for Algorithmic Discrete Mathematics (Algorithms and Combinatorics)
The book gives an accessible account of modern probabilistic methods for analyzing combinatorial structures and algorithms. It will be an useful guide for graduate students and researchers.
Special features included: a simple treatment of Talagrand's inequalities and their applications; an overview and many carefully worked out examples of the
...
Instant Metasploit Starter
Instant Metasploit Starter

The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.

This book is written in such a way that...

Cognitive Radio Architecture: The Engineering Foundations of Radio XML
Cognitive Radio Architecture: The Engineering Foundations of Radio XML
An exciting new technology, described by the one who invented it 

This is the first book dedicated to cognitive radio, a promising new technology that is poised to revolutionize the telecommunications industry with increased wireless flexibility. Cognitive radio technology integrates computational intelligence into software-defined radio...

Professional Android Sensor Programming
Professional Android Sensor Programming

ANDROIDS ARE ALIVE. THEY CAN LOCATE THEMSELVES, see, listen, and understand speech. They can sense radio signals and detect orientation, movement, and environmental properties. Can your computer do all of that?

The availability of sensors is one feature Android devices have that makes them different from other computers. Without...

Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication...
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)

Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...

Visual Indexing and Retrieval (SpringerBriefs in Computer Science)
Visual Indexing and Retrieval (SpringerBriefs in Computer Science)
Visual Indexing and Retrieval is a wide-scope research domain which unites researchers from image analysis and computer vision, to information management.

For nearly twenty years, this research has been extremely active world-wide. With the advent of social networks conveying huge amount of visual information to the
...
Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
Sure you’re vulnerable.
Now here’s what you do about it

Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard...

Large-Scale Computing Techniques for Complex System Simulations (Wiley Series on Parallel and Distributed Computing)
Large-Scale Computing Techniques for Complex System Simulations (Wiley Series on Parallel and Distributed Computing)
Complex systems are defined as systems with many interdependent parts that give rise to nonlinear and emergent properties determining their high-level functioning and behavior. Due to the interdependence of their constituent elements and other characteristics of complex systems, it is difficult to predict system behavior based...
Trusted Computing Platforms: Design and Applications
Trusted Computing Platforms: Design and Applications
Many scenarios in modern computing give rise to a common problem: why
should Alice trust computation that’s occurring at Bob’s machine? (The computer
security field likes to talk about “Alice” and “Bob” and protection against
an “adversary” with certain abilities.) What if Bob, or
...
Introduction to Computational Genomics: A Case Studies Approach
Introduction to Computational Genomics: A Case Studies Approach
Where did SARS come from? Have we inherited genes from Neanderthals? How do plants use their internal clock? The genomic revolution in biology enables us to answer such questions. But the revolution would have been impossible without the support of powerful computational and statistical methods that enable us to exploit genomic data. Many...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy