Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine
Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine

Now that IBM's Deep Blue computer beat the world's greatest human chess player, Gary Kasparov, this book will see if a story can be written better by a human or a machine.

This book marks the marriage of logic and creativity.

While it may be true that incompatible humans often wed, there are doubtless unions of a less palpable...

Global Warming - Myth or Reality?: The Erring Ways of Climatology (Springer Praxis Books / Environmental Sciences)
Global Warming - Myth or Reality?: The Erring Ways of Climatology (Springer Praxis Books / Environmental Sciences)
In the global-warming debate, definitive answers to questions about ultimate causes and effects remain elusive. In Global Warming: Myth or Reality?, Marcel Leroux seeks to separate fact from fiction in this critical debate from a climatological perspective. Beginning with a review of the dire hypotheses for climate trends, the author describes the...
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

The Routledge Companion to Twenty-First Century Literary Fiction (Routledge Literature Companions)
The Routledge Companion to Twenty-First Century Literary Fiction (Routledge Literature Companions)

The study of contemporary fiction is a fascinating yet challenging one. Contemporary fiction has immediate relevance to popular culture, the news, scholarly organizations, and education – where it is found on the syllabus in schools and universities – but it also offers challenges. What is ‘contemporary’? How...

Test Driving Linux: From Windows to Linux in 60 Seconds
Test Driving Linux: From Windows to Linux in 60 Seconds
For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you...
Network programming in .NET : C# & Visual Basic .NET
Network programming in .NET : C# & Visual Basic .NET
This book will help you develop network applications with .NET, using
either the C# or VB.NET programming language.

It covers everything you need to know about network programming in
.NET, from basic get-started information, to a huge selection of advanced
networking technologies that may have seemed like science
...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

American History Through Literature 1870-1920
American History Through Literature 1870-1920
This A-Z, cross-referenced and illustrated title provides a unique overview of the period following the Civil War through the emergence of the United States as a world power at the end of World War I. The set features more than 250 survey entries. Subjects include: political topics (Reform, Women's Suffrage); ideas in context (Scientific...
Mapping Woody Guthrie (Volume 4) (American Popular Music Series)
Mapping Woody Guthrie (Volume 4) (American Popular Music Series)
“I ain’t got no home, I’m just a-roamin’ round,” Woody Guthrie lamented in one of his most popular songs. A native of Oklahoma, he was still in his teens when he moved to Pampa, Texas, where he experienced the dust storms that would play such a crucial role in forming his identity and shaping his work....
Secrets of RSS (Visual QuickStart Guide)
Secrets of RSS (Visual QuickStart Guide)

The great advantage of RSS is that you can select your sources of information if you're the reader, and you can publicize selected information if you're the publisher. RSS is the next step in the information revolution and it's transforming the Internet and the world.

RSS...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy