Home | Amazing | Today | Tags | Publishers | Years | Search 
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

The world of hacking is a world of pain and frustration. Frustration for the hacker as he tries to figure out how to break the latest and greatest security device, and pain for the manufacturer or corporation that made or was relying on that device.

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...

Learning FreeNAS: Configure and manage a network attached storage solution
Learning FreeNAS: Configure and manage a network attached storage solution

FreeNAS is a free piece of software that turns a PC into Network Attached Storage (NAS). It supports connections from Microsoft Windows, Apple OS X, Linux, and FreeBSD. It supports RAID, has a simple web GUI, and modest system requirements. Since FreeNAS is an embedded operating system, it is compact, efficient, and dedicated to just one...

Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Java: The Good Parts
Java: The Good Parts

What if you could condense Java down to its very best features and build better applications with that simpler version? In this book, veteran Sun Labs engineer Jim Waldo reveals which parts of Java are most useful, and why those features make Java among the best programming languages available.

Every language eventually...

Pentaho 3.2 Data Integration: Beginner's Guide
Pentaho 3.2 Data Integration: Beginner's Guide

Pentaho Data Integration (a.k.a. Kettle) is a full-featured open source ETL (Extract, Transform, and Load) solution. Although PDI is a feature-rich tool, effectively capturing, manipulating, cleansing, transferring, and loading data can get complicated.

This book is full of practical examples that will help you to take advantage of...

.NET Compact Framework 3.5 Data Driven Applications
.NET Compact Framework 3.5 Data Driven Applications

Both the SQL Server Lite and Oracle Lite mobile databases are covered in detail, from data access to data synchronization. The book explains how device features such as Bluetooth, SMS, telephony, Infrared, and Windows Contacts can be accessed via .NET CF in a real-world example, namely the mobile sales-force application. It also explains.NET...

Enterprise 2.0
Enterprise 2.0

The notion that the corporation is changing fundamentally has been around for decades – dating back to Peter Drucker’s seminal work in the 1980s on ‘The New Organization’. In 1992, I discussed what I called ‘The New Enterprise’ in my book Paradigm Shift, saying ‘the corporation of old simply...

Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)

The demands of increasingly complex embedded systems and associated performance computations have resulted in the development of heterogeneous computing architectures that often integrate several types of processors, analog and digital electronic components, and mechanical and optical components—all on a single chip. As a result, now the...

The 3CX IP PBX Tutorial
The 3CX IP PBX Tutorial

Traditional PBX systems have often been expensive and proprietary. With 3CX, you can now create an easy-to-use, complete, and cost-effective phone system on Microsoft Windows. This practical guide offers the insight that a reader needs to exploit the potential that 3CX has to offer.

This practical hands-on book covers everything...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

UML For The IT Business Analyst, Second Edition
UML For The IT Business Analyst, Second Edition

Today, information-technology business analysts are often working on object-oriented (OO), Unified Modeling Language (UML) projects, yet they have a long way to go to exploit the technology beyond the adoption of use cases (just one part of the UML). This book explains how, as an IT business analyst, you can pull together all of the UML tools...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy