Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
JFK and the Unspeakable: Why He Died and Why It Matters
JFK and the Unspeakable: Why He Died and Why It Matters
BRAND NEW HARDBACKWe can know the essential truth of President John F. Kennedy's assassination. That truth can set us free.

Thanks to the pioneer investigators into President Kennedy's murder, the truth-telling of many witnesses, and a recent flood of documents through the JFK Records Act, the truth is available. Not only can the
...
Data-Driven Modeling: Using MATLAB® in Water Resources and Environmental Engineering (Water Science and Technology Library)
Data-Driven Modeling: Using MATLAB® in Water Resources and Environmental Engineering (Water Science and Technology Library)

“Data-Driven Modeling: Using MATLAB® in Water Resources and Environmental Engineering” provides a systematic account of major concepts and methodologies for data-driven models and presents a unified framework that makes the subject more accessible to and applicable for researchers and practitioners. It integrates important...

Prediction of Protein Structures, Functions, and Interactions
Prediction of Protein Structures, Functions, and Interactions

The growing flood of new experimental data generated by genome sequencing has provided an impetus for the development of automated methods for predicting the functions of proteins that have been deduced by sequence analysis and lack experimental characterization.

Prediction of Protein Structures, Functions and Interactions presents...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

How: Why How We Do Anything Means Everything...in Business (and in Life)
How: Why How We Do Anything Means Everything...in Business (and in Life)
The flood of information and unprecedented transparency reshaping today's business world has dramatically changed the rules of the game. It's no longer what you do that sets you apart from others, but how you do what you do. Whats are commodities, easily duplicated or reverse-engineered. Sustainable advantage and enduring success—for both...
The Definitive Guide to Interwoven TeamSite (Definitive Guides)
The Definitive Guide to Interwoven TeamSite (Definitive Guides)

Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs....

MySQL Cookbook: Solutions for Database Developers and Administrators
MySQL Cookbook: Solutions for Database Developers and Administrators

MySQL’s popularity has brought a flood of questions about how to solve specific problems, and that’s where this cookbook is essential. When you need quick solutions or techniques, this handy resource provides scores of short, focused pieces of code, hundreds of worked-out examples, and clear, concise explanations for...

Problems and Solutions in Biological Sequence Analysis
Problems and Solutions in Biological Sequence Analysis
Bioinformatics, an integral part of post-genomic biology, creates principles and ideas for computational analysis of biological sequences. These ideas facilitate the conversion of the flood of sequence data unleashed by the recent information explosion in biology into a continuous stream of discoveries. Not surprisingly, the new biology of the...
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect yourself from these information predators by securing your...
Energy Evolution (The Eco-Technology Series)
Energy Evolution (The Eco-Technology Series)
Coincidence? Or perhaps not! Standing as we are on the threshold of a new era, the first dawning of a new age, there is an air of expectancy of things imminent and better. In a certain sense this has psychologically programmed us with a willingness to embrace new concepts, to inaugurate and accept far-reaching change. It is also a time to reflect...
Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices
Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices

Break through the hype and learn how to extract actionable intelligence from the flood of IoT data

Key Features

  • Make better business decisions and acquire greater control of your IoT infrastructure
  • Learn techniques to solve unique problems associated with IoT and examine and analyze data...
Result Page: 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy