Home | Amazing | Today | Tags | Publishers | Years | Search 
Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
MATLAB Primer, Sixth Edition
MATLAB Primer, Sixth Edition
This fifth edition extends the MATLAB Primer, representing the significant features introduced in MATLAB 5 and reflecting a dramatic change in the text . This pocket book serves as an excellent resource for students and engineers requiring a high-level introduction and handy reference to MATLAB 5, helping readers to learn efficiently and...
Foundation 3ds Max 8 Architectural Visualization
Foundation 3ds Max 8 Architectural Visualization
Welcome to the world of 3D architectural visualizations using the most powerful and versatile 3D software package on the planet: 3ds Max. In just the last few years, the visualization industry has arguably become the fastest-growing 3D industry, and may soon overtake all others in total number of users. Just as the use of CAD became the norm for...
A Practical Guide to Managing Information Security (Artech House Technology Management Library)
A Practical Guide to Managing Information Security (Artech House Technology Management Library)
This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need...
Focus On 3D Models (Game Development)
Focus On 3D Models (Game Development)
No matter where you turn in the world of gaming, you?re bound to notice the rapidly increasing use of 3D. If you?re serious about game programming, you must understand the world of 3D modeling. Focus On 3D Models is the guide you need for doing just that! This is the only book on the market that gives game programmers a comprehensive guide to the...
Mathematics for 3D Game Programming and Computer Graphics, Second Edition (Game Development Series)
Mathematics for 3D Game Programming and Computer Graphics, Second Edition (Game Development Series)
This completely updated second edition illustrates the mathematical concepts that a game programmer would need to develop a professional-quality 3D engine. Although the book is geared toward applications in game development, many of the topics appeal to general interests in 3D graphics. It starts at a fairly basic level in areas such as vector...
Cryptography in C and C++, Second Edition
Cryptography in C and C++, Second Edition

This book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.

Text focusing on the practical aspects of cryptography in C and C++,
...
The Firebird Book: A Reference for Database Developers
The Firebird Book: A Reference for Database Developers

The Firebird Book: A Guide for Database Developers is a comprehensive, practical guide for developing client/server FirebirdSQL database applications for small and large networks of users. FirebirdSQL is an open source database, and while not as popular as MySQL or PostgreSQL, it has a dedicated following, and has far more advanced features.

...
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Provides practical, step-by-step instructions on how to design and develop effective, costefficient data warehouses. DLC: Telecommunications Management.

Through dozens of case studies and real-world examples, this clearly written guide shows telecommunications managers how to build more effective data warehouses without wasting time and
...
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
This text is based on a simple and fully reactive computational model that allows for intuitive comprehension and logical designs. The principles and techniques presented can be applied to any distributed computing environment (e.g., distributed systems, communication networks, data networks, grid networks, internet, etc.). The text provides a...
Microsoft Office FrontPage 2003 Inside Out
Microsoft Office FrontPage 2003 Inside Out

Hey, you know your way around the Web—so now dig into FrontPage 2003 and really put your Web design skills to work! This supremely organized reference packs hundreds of time-saving solutions, troubleshooting tips, and handy workarounds in concise, fast answer format. Quickly advance your expertise by drilling deep into core and advanced...

Result Page: 798 797 796 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy