Home | Amazing | Today | Tags | Publishers | Years | Search 
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data clustering is a highly interdisciplinary field whose goal is to divide a set of objects into homogeneous groups such that objects in the same group are similar and objects in different groups are quite distinct. Thousands of papers and a number of books on data clustering have been published over the past 50 years....
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
Today’s Web users expect exciting pages that are updated frequently and provide a customized experience. For them, Web sites are more like communities, to which they’ll return time and again. At the same time, Web-site administrators want sites that are easier to update and maintain, understanding...
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
Whether you’re shopping for clothes from your computer or mobile phone, or selling artworks around the globe, you face a dizzying array of choices and decisions. How do I pay? How do I get paid? What if something goes wrong?

The answer? PayPal.

We are—and will continue to be—the
...
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
The International Workshop on Complex Networks—CompleNet (www.complenet.org)—was initially proposed in 2008 with the first workshop taking place in 2009. The initiative was the result of efforts from researchers from the Bio-Complex Laboratory in the Department of Computer Sciences at Florida Institute of...
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Programming Clojure
Programming Clojure

Clojure is a powerful, general-purpose programming language. As such, this book is for experienced programmers looking for power and elegance. This book will be useful for anyone with experience in a modern programming language such as C#, Java, Python, or Ruby.

Clojure is built on top of the Java Virtual
...
Responsive Web Design with HTML5 and CSS3
Responsive Web Design with HTML5 and CSS3
If you think you need to create a "mobile" version of your website—think again! A responsive web design provides one design that looks great on smart phone, desktop, and everything in-between. It will effortlessly respond to the size of the user's screen, providing the best experience possible for both today's and...
Time Domain Electromagnetics (Academic Press Series in Engineering)
Time Domain Electromagnetics (Academic Press Series in Engineering)
In recent times, we have seen increased interest in the direct time domain methods to calculate electromagnetic scattering/interaction phenomenon. This may be due to the surge in activities in the areas of EMP, short-pulse radar, or other related applications. It may also be due to the fact that the time domain methods have several...
Result Page: 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy