Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
From a linguistic perspective, it is quantification which makes all the difference between “having no dollars” and “having a lot of dollars”. And it is the meaning of the quantifier “most” which eventually decides if “Most Americans voted Kerry” or “Most Americans voted Bush” (as it...
Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Microsoft Windows XP Professional Resource Kit, Second Edition
Microsoft Windows XP Professional Resource Kit, Second Edition

Install, configure, and support the Windows XP Professional operating system with expertise from the Microsoft Windows team. This official Resource Kit packs more than 1600 pages of in-depth technical information, including two new chapters from the Microsoft Windows Security Resource Kit; a bonus eBook, Automating and...

Learning Bing Maps API
Learning Bing Maps API

Bing Maps are a great resource and very versatile when you know how. And this book will show you how, covering everything from embedding on a web page to customizing with your own styles and geo-data.

Overview

  • Display address information for any point on the map through the location-based REST services...
Algorithms in Java: Parts 1-4, Third Edition
Algorithms in Java: Parts 1-4, Third Edition

Sedgewick has a real gift for explaining concepts in a way that makes them easy to understand. The use of real programs in page-size (or less) chunks that can be easily understood is a real plus. The figures, programs, and tables are a significant contribution to the learning experience of the reader; they make this book...

MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition
MIDP 2.0 Style Guide for the Java 2 Platform, Micro Edition

MIDP 2.0 Style Guide for the Java(TM) 2 Platform, Micro Edition, is the comprehensive reference for designing and creating interactive Java(TM) applications for consumer-oriented mobile devices. Readers learn how to best exploit MIDP 2.0 features, such as the gaming API, multimedia, and...

Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages of the human speech communication process. This process, sometimes referred to as speech chain [1], starts with the formation of a linguistic message in the speaker’s brain and ends with the arrival of the message in the...
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
This redbook will help you install, tailor and configure the SuSE Linux 7.0 distribution on different servers of the xSeries and Netfinity class. You will be instructed on how to do the basic installation, and installing and configuring different services such as Apache (http-Server), Samba (Fileserver for Windows-based networks), and Postfix (an...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Microsoft Ole Db 2.0 Programmer's Reference and Data Access Sdk (Microsoft Professional Editions)
Microsoft Ole Db 2.0 Programmer's Reference and Data Access Sdk (Microsoft Professional Editions)
rogrammers understand how to build business applications that exploit all the organization's information resources-in whatever form and from wherever they reside in the enterprise-with Microsoft's powerful OLE DB 2.0 technology. This kit packages complete information and tools to create universal data access for all Windows(r)- and Windows...
Beginning Android 4 (Beginning Apress)
Beginning Android 4 (Beginning Apress)

Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars, in in-flight entertainment systems on planes, and even in

robots!

However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android
...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy