Today’s economy demands top quality software development in record time and with maximum efficiency. UML arms you to meet that challenge, and the UML Bible supplies the most comprehensive UML education you can get. One volume covers everything from understanding and using UML and diagramming notation...
With ninety per cent of visible matter in the universe existing in the plasma state, an understanding of magnetohydrodynamics is essential for anyone looking to understand solar and astrophysical processes, from stars to accretion discs and galaxies; as well as laboratory applications focused on harnessing controlled fusion energy. This...
Traditional PBX systems have often been expensive and proprietary. With 3CX, you can now create an easy-to-use, complete, and cost-effective phone system on Microsoft Windows. This practical guide offers the insight that a reader needs to exploit the potential that 3CX has to offer.
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
In the two decades since field-programmable gate arrays (FPGAs) were introduced, they have radically changed the way digital logic is designed and deployed. By marrying the high performance of application-specific integrated circuits (ASICs) and the flexibility of microprocessors, FPGAs have made possible entirely new types of applications....
Deformable surface 3D reconstruction from monocular images is an active area of research in the
Computer Vision community. This encompasses recovering both the shape of thin objects that can
be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects.
Whereas this may seem easy for a human...
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting...
Programming is an art. Although traditional art imitates life, programming simulates life.
Every abstract concept in programming, and to a great extent in the fi eld of computer science,
has its roots in our daily life. For example, humans and possibly all other living forms
were multiprocessing long before the term entered into...
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...