Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dependability of Self-Optimizing Mechatronic Systems (Lecture Notes in Mechanical Engineering)
Dependability of Self-Optimizing Mechatronic Systems (Lecture Notes in Mechanical Engineering)

Intelligent technical systems, which combine mechanical, electrical and software engineering with methods from control engineering and advanced mathematics, go far beyond the state of the art in mechatronics and open up fascinating perspectives. Among these systems are so-called self-optimizing systems, which are able to adapt their behavior...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Joomla!, exclamation point and all, is one of the most searched–for and hired–for open source content management systems in the world. Since 2007, the combination of Joomla! and Dan Rahmel’s bestselling Beginning Joomla!, From Novice to Professional have made it so that all you have to do is read a single...
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Artificial Organic Networks: Artificial Intelligence Based on Carbon Networks
Artificial Organic Networks: Artificial Intelligence Based on Carbon Networks

This monograph describes the synthesis and use of biologically-inspired artificial hydrocarbon networks (AHNs) for approximation models associated with machine learning and a novel computational algorithm with which to exploit them. The reader is first introduced to various kinds of algorithms designed to deal with approximation problems and...

WebGL Game Development
WebGL Game Development

WebGL is the standard for rendering 3D graphics in a browser using JavaScript. This book will teach you to exploit the full potential of WebGL in game development by rendering complex 3D objects. The essential tutorial.

Overview

  • Load and render complex 3D objects in WebGL using JavaScript
  • ...
RF Mems Circuit Design for Wireless Communications
RF Mems Circuit Design for Wireless Communications
This book examines the recent progress made in the emerging field of microelectromechanical systems (MEMS) technology in the context of its imminent insertion and deployment in radio frequency (RF) and microwave wireless applications. In particular, as the potential of RF MEMS to enable the implementation of sophisticated, yet low-power, portable...
3D Game Development with Microsoft Silverlight 3: Beginner's Guide
3D Game Development with Microsoft Silverlight 3: Beginner's Guide
Microsoft Silverlight is a programmable web browser plug-in that enables the animation, vector graphics, and audio-video playback features that characterize Rich Internet Applications. Silverlight is a great (and growing) RIA platform and games are the next level to exploit in it. But it doesn't offer 3D capabilities out of the box and integrating...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Creative Photoshop: Digital Illustration and Art Techniques, covering Photoshop CS3 (Digital Workflow)
Creative Photoshop: Digital Illustration and Art Techniques, covering Photoshop CS3 (Digital Workflow)
Dereks edge is that he wont stand still. He has a knack for finding new corners of the program to exploit and innovative ways of doing so. Hes pushed the boundaries not only for his own art but also for thousands of up and coming artists who also want to create onscreen the visions they have in their minds. If youve bought this book, youre about to...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy