Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook is at once eye candy, artistic inspiration, and incomparable technical guidance for intermediate-to-advanced digital imaging professionals, graphic artists, photographers, and just about anyone involved in creating digital images or animations. A visual splendor, this full-color book...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Calcium Signalling in Cancer
Calcium Signalling in Cancer

Calcium signalling occupies a preeminent position in the signal transduction system of the cell by virtue of its participation in a wide range of physiological functions together with the biological events associated with genetic expression, cell proliferation and apoptosis, as well as cell differentiation and morphogenesis. It is an...

The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical measurements. Modern measurement systems operate in a 3-D spatial environment. The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure offers a new model for handling digital...
IMechE Engineers' Databook
IMechE Engineers' Databook
This significantly updated 2012 edition of the Engineers’Data Book replaces the three successful previous editions published in 1998, 2000 and 2004. Since the data book’s inception, feedback from engineers and students has indicated that, despite the proliferation of technical information in published and...
J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Signal Integrity Issues and Printed Circuit Board Design
Signal Integrity Issues and Printed Circuit Board Design
The definitive high-speed design resource for every PCB designer

In this book, renowned engineer,author, and seminar leader Douglas Brooks teaches PCB designers how tosuccessfully design boards for any high-speed application. Brooks begins withan easy-to-understand electronics primer for every PCB designer, then...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Refactoring Databases : Evolutionary Database Design
Refactoring Databases : Evolutionary Database Design

Refactoring has proven its value in a wide range of development projectshelping software professionals improve system designs, maintainability, extensibility, and performance. Now, for the first time, leading agile methodologist Scott Ambler and renowned consultant Pramodkumar Sadalage introduce powerful refactoring techniques...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy