Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Guide to MATLAB Object-Oriented Programming
A Guide to MATLAB Object-Oriented Programming
I am an admitted object-oriented fanatic. I have been designing and implementing object-oriented software for more than twenty years. When I started designing and implementing object-oriented MATLAB®, I encountered many detractors. They would say things like “The object model isn’t complete,” “You can’t have public...
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Entity Framework Tutorial - Second Edition
Entity Framework Tutorial - Second Edition

A comprehensive guide to the Entity Framework with insight into its latest features and optimizations for responsive data access in your projects

About This Book

  • Create Entity data models from your database and use them in your applications
  • Learn about the Entity Client data provider and...
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

Programming Interviews Exposed: Secrets to Landing Your Next Job (Programmer to Programmer)
Programming Interviews Exposed: Secrets to Landing Your Next Job (Programmer to Programmer)

The pressure is on during the interview process but with the right preparation, you can walk away with your dream job. This classic book uncovers what interviews are really like at America's top software and computer companies and provides you with the tools to succeed in any situation. The authors take you step-by-step through new problems and...

IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Implementing and Developing Cloud Computing Applications
Implementing and Developing Cloud Computing Applications

I was first exposed to what would become the Internet way back in 1969, while I was still an undergraduate at Brandeis University working on ARPANet, the forerunner to the present Internet, which operated at the then blazing speed of 2,400 bps, ultimately increased to 50 Kbps (see http://www.computerhistory.org/internet_history/). I...

Java Programming Interviews Exposed
Java Programming Interviews Exposed

If you are a skilled Java programmer but are concerned about the Java coding interview process, this real-world guide can help you land your next position

Java is a popular and powerful language that is a virtual requirement for businesses making use of IT in their daily operations. For Java programmers, this reality offers...

Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Investigator's Guide to Steganography
Investigator's Guide to Steganography

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable...

Wireless Sensor Networks (Artech House Mems and Sensors Library)
Wireless Sensor Networks (Artech House Mems and Sensors Library)
Our society is awash in “machine intelligence” of various kinds, from smart thermostats
in our homes, to expert systems and design aids in our workplaces, to jet
aircraft landing safely in treacherous weather under computer control. Over the last
century, we have witnessed more and more of the “drudgery” of
...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy