Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Data Professionals at Work
Data Professionals at Work
Enjoy reading interviews with more than two dozen data professionals to see a picture of what it’s like to work in the industry managing and analyzing data, helping you to know what it takes to move from your current expertise into one of the fastest growing areas of technology today. Data is the hottest word of...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Complex Valued Nonlinear Adaptive Filters: Noncircularity, Widely Linear and Neural Models
Complex Valued Nonlinear Adaptive Filters: Noncircularity, Widely Linear and Neural Models

This book was written in response to the growing demand for a text that provides a unified treatment of linear and nonlinear complex valued adaptive filters, and methods for the processing of general complex signals (circular and noncircular). It brings together adaptive filtering algorithms for feedforward (transversal) and feedback...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Higher Engineering Mathematics, Fifth Edition
Higher Engineering Mathematics, Fifth Edition
Includes: * 1,000 Worked Examples * 1,750 Further Problems * 19 Assignments

John Bird's approach, based on numerous worked examples and interactive problems, is ideal for students from a wide range of academic backgrounds, and can be worked through at the student's own pace. Basic mathematical theories are explained in the simplest of
...
Partial Differential Equations and the Finite Element Method
Partial Differential Equations and the Finite Element Method
A systematic introduction to partial differential equations and modern finite element methods for their efficient numerical solution

Partial Differential Equations and the Finite Element Method provides a much-needed, clear, and systematic introduction to modern theory of partial differential equations (PDEs) and...

Algebraic Models in Geometry (Oxford Graduate Texts in Mathematics)
Algebraic Models in Geometry (Oxford Graduate Texts in Mathematics)
Rational homotopy is a very powerful tool for differential topology and geometry. This text aims to provide graduates and researchers with the tools necessary for the use of rational homotopy in geometry. Algebraic Models in Geometry has been written for topologists who are drawn to geometrical problems amenable to topological methods and also...
Content Networking in the Mobile Internet
Content Networking in the Mobile Internet

A cutting-edge guide to the next generation Mobile Internet architecture and applications

The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is...

The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleanin
The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleanin

The Extract-Transform-Load (ETL) system is the foundation of the data warehouse. A properly designed ETL system extracts data from the source systems, enforces data quality and consistency standards, conforms data so that separate sources can be used together, and finally delivers data in a presentation-ready format so that...

Mathematics of Shape Description: A Morphological Approach to Image Processing and Computer Graphics
Mathematics of Shape Description: A Morphological Approach to Image Processing and Computer Graphics
Image processing problems are often not well defined because real images are contaminated with noise and other uncertain factors. In Mathematics of Shape Description, the authors take a mathematical approach to address these problems using the morphological and set-theoretic approach to image processing and computer graphics by presenting...
Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
The ultimate electrical equipment troubleshooting pocket guide

Designed for quick reference at any job site, the Electrician's Troubleshooting and Testing Pocket Guide enables electricians using portable meters to test, maintain, and troubleshoot all types of electrical equipment and systems.

This updated...

Result Page: 372 371 370 369 368 367 366 365 364 363 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy