Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Practical Software Factories in .NET
Practical Software Factories in .NET

The promise of Software Factories is to streamline and automate software development-and thus to produce higher-quality software more efficiently. The key idea is to promote systematic reuse at all levels and exploit economies of scope, which translates into concrete savings in planning, development, and maintenance efforts. However, the theory...

C#.NET Illuminated
C#.NET Illuminated
I designed this text to teach programmers and aspiring programmers how to build applications using the C# language and Visual Studio .NET. These tools facilitate building applications for desktop computers, the Internet, and mobile devices. The text provides a thorough introduction to C#, and carefully shows how to exploit the power of the Visual...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach...
SDL Trados Studio – A Practical Guide
SDL Trados Studio – A Practical Guide

SDL Trados Studio can make a powerful difference to your translating efficiency. This guide makes it easier to fully exploit this leading translation memory program with a clear task-oriented step-by-step approach to learning.

Overview

  • Unleash the power of Trados’s many features to boost your...
Intel Galileo Networking Cookbook
Intel Galileo Networking Cookbook

Over 50 recipes that will help you use the Intel Galileo board to build exciting network-connected projects

About This Book

  • Create networking applications using the Intel Galileo board
  • Control your web-based projects in real time from anywhere in the world
  • Connect to the...
SAP HANA Cookbook
SAP HANA Cookbook

Your all-inclusive guide to understanding SAP HANA with practical recipes

Overview

  • Understand the architecture of SAP HANA, effectively transforming your business with the modeler and in-memory computing engine
  • Learn about Business Intelligence, Analytics, and Predictive analytics on top of...
Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Silverlight 1.0 Unleashed
Silverlight 1.0 Unleashed
Thank you for picking up Silverlight 1.0 Unleashed! Silverlight is changing the way many people think about designing and developing websites or web applications, and this book helps you take advantage of everything Silverlight enables. Silverlight makes it easier than ever to create rich web-based content or applications. And given that it’s...
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy