Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Brain Dynamics: An Introduction to Models and Simulations (Springer Series in Synergetics)
Brain Dynamics: An Introduction to Models and Simulations (Springer Series in Synergetics)

This is an excellent introduction for graduate students and nonspecialists to the field of mathematical and computational neurosciences. The book approaches the subject via pulsed-coupled neural networks, which have at their core the lighthouse and integrate-and-fire models. These allow for highly flexible modeling of realistic synaptic...

The St. Martin's Guide to Writing
The St. Martin's Guide to Writing


Whether you have years of experience as a teacher or are new to the classroom, you and your students can count on The St. Martin’s Guide to Writing to provide the support you need in first-year composition, with a rhetoric, an array of engaging readings, a research manual, and a handbook, all in a single book...

Inside the Box: Leading With Corporate Values to Drive Sustained Business Success
Inside the Box: Leading With Corporate Values to Drive Sustained Business Success

How to turn company values into competitive advantage

We are inclined, for whatever reason, to treat values like works of art. We view them as nice to hang on the wall, and beautiful to look at, but we don’t act as though they truly mean much to us in the real world. In fact, the opposite is true. The best...

This Means This, This Means That: A User's Guide to Semiotics
This Means This, This Means That: A User's Guide to Semiotics

Semiotics is the theory of signs, and reading signs is a part of everyday life: from road signs that point to a destination, to smoke that warns of fire, to the symbols buried within art and literature. Semiotic theory can, however, seem mysterious and impenetrable. This introductory book decodes that mystery using visual examples instead of...

Event-Driven Programming
Event-Driven Programming
The previous unit, Unit 6, has shown you how to create graphical user interfaces that contain a wide range of components and have quite sophisticated layouts. You are also in a position now to make use of Java reference material to investigate and use other components and layouts. However, when the user clicks on a button or enters text, nothing...
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)
Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)

This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX techniques, such as water, fire, smoke, and wind, has been proven through active involvement and utilization in movies and images. However, they have yet to be extensively applied in the game...

Create Mobile Games with Corona: Build with Lua on iOS and Android
Create Mobile Games with Corona: Build with Lua on iOS and Android

Printed in full color.

Develop cross-platform mobile games with Corona using the Lua programming language! Corona is experiencing explosive growth among mobile game developers, and this book gets you up to speed on how to use this versatile platform. You'll use the Corona SDK to simplify game programming and take a
...

Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

The Joy of Clojure
The Joy of Clojure

Summary

The Joy of Clojure, Second Edition is a deep look at the Clojure language. Fully updated for Clojure 1.6, this new edition goes beyond just syntax to show you the "why" of Clojure and how to write fluent Clojure code. You'll learn functional and declarative approaches to programming...

Windows 10 Guidebook: A tour into the future of computing
Windows 10 Guidebook: A tour into the future of computing

Windows 10 is really easy to use with this guide – for Windows insiders upgrading from Windows 7 or 8.1 to Windows 10, as well as for first-time users that want to learn about the operating system basics. 
Chapters 1 and 2 present the new and changed features in Windows 10. Furthermore, we describe what you have to watch
...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy