Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL
Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL

The Internet is bigger and better than what a mere browser allows. Webbots, Spiders, and Screen Scrapers is for programmers and businesspeople who want to take full advantage of the vast resources available on the Web. There's no reason to let browsers limit your online...

Medical Image Analysis
Medical Image Analysis

The expanded and revised edition will split Chapter 4 to include more details and examples in FMRI, DTI, and DWI for MR image modalities. The book will also expand ultrasound imaging to 3-D dynamic contrast ultrasound imaging in a separate chapter.

A new chapter on Optical Imaging Modalities elaborating microscopy, confocal...

The Transform and Data Compression Handbook (Electrical Engineering and Signal Processing Series)
The Transform and Data Compression Handbook (Electrical Engineering and Signal Processing Series)

Transforms and Data Compression Handbook presents issues that are fundamental to communications, image processing, image and data storage, and the medical field. By illustrating the link between the transformation of data and efficient compression, using the basic theory of transforms and real compression applications, the editors create a...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Parallel Robots (Solid Mechanics and Its Applications)
Parallel Robots (Solid Mechanics and Its Applications)

Parallel robots are closed-loop mechanisms presenting very good performances in terms of accuracy, velocity, rigidity and ability to manipulate large loads. They have been used in a large number of applications ranging from astronomy to flight simulators and are becoming increasingly popular in the field of machine-tool industry. This book...

The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Learn how to solve complex differential equations using MATLAB®

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB® teaches readers how to numerically solve both ordinary and partial differential equations with ease. This innovative publication brings together a skillful treatment of MATLAB...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy