Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Algorithms in Computational Molecular Biology: Techniques, Approaches and Applications
Algorithms in Computational Molecular Biology: Techniques, Approaches and Applications

This book represents the most comprehensive and up-to-date collection of information on the topic of computational molecular biology. Bringing the most recent research into the forefront of discussion, Algorithms in Computational Molecular Biology studies the most important and useful algorithms currently being used in the field, and...

Computer Algebra and Symbolic Computation: Mathematical Methods
Computer Algebra and Symbolic Computation: Mathematical Methods
Computer algebra is the field of mathematics and computer science that is concerned with the development, implementation, and application of algorithms that manipulate and analyze mathematical expressions. This book and the companion text, Computer Algebra and Symbolic Computation: Mathematical Methods, are an introduction to the subject that...
Node Cookbook
Node Cookbook
The principles of asynchronous event-driven programming are perfect for today's Web, where efficient real-time applications and scalability are at the forefront. Server-side JavaScript has been here since the nineties, but Node got it right. With a thriving community and interest from the Internet giants, it could be the PHP of tomorrow....
NoSQL For Dummies
NoSQL For Dummies

Get up to speed on the nuances of NoSQL databases and what they mean for your organization

This easy to read guide to NoSQL databases provides the type of no-nonsense overview and analysis that you need to learn, including what NoSQL is and which database is right for you. Featuring specific evaluation criteria for NoSQL databases,...

Problem Solving: Methods, Programming and Future Concepts
Problem Solving: Methods, Programming and Future Concepts
Problem solving is the very area of artificial intelligence (AI) which, probably, will never result in a complete set of formalized theories, in a kind of pragmatic philosophy, or in a "universal" applied discipline. Studying the questions concerning this area encompasses different concepts, models and theories.

In this
...
Creating Digital Content : Video Production for Web, Broadcast, and Cinema
Creating Digital Content : Video Production for Web, Broadcast, and Cinema
JOIN THE DIGITAL PRODUCTION REVOLUTION!

Not very long ago, there was television, film, video, and other forms of moving imagery. Now, in the Digital Era, all of this is "content," a stream of bits providing superior picture and audio quality and options for HDTV, interactivity, e-commerce, and new ways to create and consume the...

Active Mining - New Directions of Data Mining (Frontiers in Artificial Intelligence and Applications, Knowl)
Active Mining - New Directions of Data Mining (Frontiers in Artificial Intelligence and Applications, Knowl)

The need for collecting relevant data sources, mining useful knowledge from different forms of data sources and promptly reacting to situation change is ever increasing. Active mining is a collection of activities each solving a part of this need, but collectively achieving the mining objective through the spiral effect of these interleaving...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)

Approaches to the recovery of three-dimensional information on a biological object, which are often formulated or implemented initially in an intuitive way, are concisely described here based on physical models of the object and the image-formation process. Both three-dimensional electron microscopy and X-ray tomography can be captured in the...

The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy