Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modal Logic: An Introduction to its Syntax and Semantics
Modal Logic: An Introduction to its Syntax and Semantics
In this text, a variety of modal logics at the sentential, first-order, and second-order levels are developed with clarity, precision and philosophical insight. All of the S1-S5 modal logics of Lewis and Langford, among others, are constructed. A matrix, or many-valued semantics, for sentential modal logic is formalized, and an important result...
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)
Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)

Social Semantics: The Search for Meaning on the Web provides a unique introduction to identity and reference theories of the World Wide Web, through the academic lens of philosophy of language and data-driven statistical models. The Semantic Web is a natural evolution of the Web, and this book covers the URL-based Web architecture...

Complex Variables Demystified
Complex Variables Demystified
Complex variables, and its more advanced version, complex analysis, is one of the most fascinating areas in pure and applied mathematics. It all started when mathematicians were mystified by equations that could only be solved if you could take the square roots of negative numbers. This seemed bizarre, and back then nobody could imagine that...
Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
OpenStack Cloud Computing Cookbook - Second Edition
OpenStack Cloud Computing Cookbook - Second Edition

Over 100 recipes to successfully set up and manage your OpenStack cloud environments with complete coverage of Nova, Swift, Keystone, Glance, Horizon, Neutron, and Cinder

Overview

  • Updated for OpenStack Grizzly
  • Learn how to install, configure, and manage all of the OpenStack core projects...
The Shockwave Rider
The Shockwave Rider

He was the most dangerous fugitive alive, but he didn’t exist!

Nickie Haflinger had lived a score of lifetimes . . . but technically he didn’t exist. He was a fugitive from Tarnover, the high-powered government think tank that had educated him. First he had broken his identity code—then he
...

Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Debates in Modern Philosophy: Essential Readings and Contemporary Responses (Key Debates in the History of Philosophy)
Debates in Modern Philosophy: Essential Readings and Contemporary Responses (Key Debates in the History of Philosophy)

Debates in Modern Philosophy: Essential Readings and Contemporary Responses provides an in-depth, engaging introduction to important issues in modern philosophy.  It presents 13 key interpretive debates to students, and ranges in coverage from Descartes' Meditations to Kant's Critique of Pure...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy