Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Drawing on a wealth of new evidence from all sides, Triumph Forsaken overturns most of the historical orthodoxy on the Vietnam War. Through the analysis of international perceptions and power, it shows that South Vietnam was a vital interest of the United States. The book provides many new insights into the overthrow of Ngo Dinh Diem in 1963 and...
Modelling and Control of Dynamical Systems: Numerical Implementation in a Behavioral Framework (Studies in Computational Intelligence)
Modelling and Control of Dynamical Systems: Numerical Implementation in a Behavioral Framework (Studies in Computational Intelligence)
A paradigmatic perspective for modeling and control of physical systems has been used since a long time ago: The input/output approach. Although quite natural for our human experience, this perspective imposes a cause/effect framework to the system under study although such system may not have necessarily such cause/effect structure. Actually, from...
Market Timing For Dummies (Business & Personal Finance)
Market Timing For Dummies (Business & Personal Finance)
Want to improve your market timing so you can send your investment returns soaring? Market Timing For Dummies takes the guesswork out of developing a trading strategy and provides all of the tools you need to forecast, prepare for, and take advantage of market trends and changes.

This authoritative guide is packed with expert...

Beginning Programming All-In-One Desk Reference For Dummies (Computers)
Beginning Programming All-In-One Desk Reference For Dummies (Computers)

So you want to be a programmer? Or maybe you just want to be able to make your computer do what YOU want for a change? Maybe you enjoy the challenge of identifying a problem and solving it. If programming intrigues you for whatever reason, Beginning Programming All-In-One Desk Reference For Dummies is like having a starter...

World War II: A Student Encyclopedia (5 volume set)
World War II: A Student Encyclopedia (5 volume set)
The 20th century's pivotal event, the climax of long-running animosities and aggression, and the beginning of the modern globalized world, World War II offers an infinite range of possible approaches and topics for students and teachers. Now there is a groundbreaking new reference that puts the entire scope of World War II in your...
Emergence in Games (Charles River Media Game Development)
Emergence in Games (Charles River Media Game Development)
The future direction of game development is towards more flexible, realistic, and interactive game worlds. However, current methods of game design do not allow for anything other than pre-scripted player exchanges and static objects and environments. An emergent approach to game development involves the creation of a globally designed game system...
Anatomy of a Robot (TAB Robotics)
Anatomy of a Robot (TAB Robotics)
This work looks under the hood of all robotic projects, stimulating teachers, students, and hobbyists to learn more about the gamut of areas associated with control systems and robotics. It offers a unique presentation in providing both theory and philosophy in a technical yet entertaining way.

UNDER THE HOOD OF A
...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Foundation ASP.NET for Flash
Foundation ASP.NET for Flash
ASP.NET 2.0 is the new version of Microsoft's groundbreaking server-side scripting language. There is currently a huge demand to integrate dynamic content into Flash websites and applications and, as a solid competitor to technologies such as JSP, PHP, and ColdFusion, ASP.NET is one of the most popular choices to achieve this.

Used in...

Moral Machines: Teaching Robots Right from Wrong
Moral Machines: Teaching Robots Right from Wrong
So in a single thought-provoking volume, the authors not only introduce machine ethics, but also an inquiry which penetrates to the deepest foundations of ethics. The conscientious reader will no doubt find many challenging ideas here that will require a reassessment of her own beliefs, making this text a must-read among recent books in philosophy,...
Result Page: 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy