Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Hardware Security and Trust
Introduction to Hardware Security and Trust
As technology feature size of devices and interconnects shrink at the rate predicted by Moore’s law, gate density and design complexity on single integrated chip (IC) keep increasing in recent decades. The close to nanoscale fabrication process introduces more manufacturing errors. New failure mechanisms that are not covered...
Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

High Performance Computing: Programming and Applications (Chapman & Hall/CRC Computational Science)
High Performance Computing: Programming and Applications (Chapman & Hall/CRC Computational Science)

The future of high-performance computing (HPC) lies with large distributed parallel systems with three levels of parallelism, thousands of nodes containing MIMD* groups of SIMD* processors. For the past 50 years, the clock cycle of single processors has decreased steadily and the cost of each processor has decreased. Most applications would...

The Archaeology of Athens
The Archaeology of Athens
The city of Athens has played a leading role in the development of European civilization. When we look back through time to the origins of so many of the institutions and activities which thrive or are valued today, we are led to ancient Greece and, most often, to Athens in the Classical period (480–323 B.C.). Time and again...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Visual Basic 2012 Programmer's Reference
Visual Basic 2012 Programmer's Reference
IT HAS BEEN SAID THAT SIR ISAAC NEWTON was the last person to know everything. He was an accomplished physicist (his three laws of motion were the basis of classical mechanics, which defi ned astrophysics for three centuries), mathematician (he was one of the inventors of calculus and developed Newton’s Method for fi nding...
Windows Azure programming patterns for Start-ups
Windows Azure programming patterns for Start-ups
Windows Azure was officially announced at PDC 2008, but looking back, I had a quick look in the kitchen of Windows Azure in 2007 while I was visiting Redmond during the Lead Enterprise Architect Program (LEAP) sessions. Pat Helland, a senior architect at Microsoft, gave a talk on The irresistible forces meet the movable objects....
Geographic Profiling
Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic studies of crime were cartographic exercises made possible by recordkeeping systems created to track criminal convictions in France and England during the early part of the 19th century. Compared with maps of demographic, economic, and social...
Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (1 volume)
Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (1 volume)
When first thinking of putting together a compilation of writings on a particular topic, those that have such a notion believe they will give meaning to a paradigm, influence a research area, or at a minimum shed light exploring a critical phenomenon. Ultimately, the editors and authors hope that the exchange for the reader - in...
Corporate Financial Accounting & Reporting
Corporate Financial Accounting & Reporting

Corporate Financial Accounting and Reporting is a comprehensive accounting textbook directed at those using financial reports. Its aim is to help current and future managers gain a thorough understanding of companies' published reports and is unique in the fact that it covers all three years of a traditional financial accounting course....

Coding Freedom: The Ethics and Aesthetics of Hacking
Coding Freedom: The Ethics and Aesthetics of Hacking

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source...

HIV & AIDS in Schools: The Political Economy of Pressure Groups & Miseducation (Occasional Paper, 121)
HIV & AIDS in Schools: The Political Economy of Pressure Groups & Miseducation (Occasional Paper, 121)

HIV and Aids teaching is compulsory in British schools but the content is not prescribed. Should teaching in such a difficult field, where there are disputes among experts, be left to secondary school teachers with no specialist knowledge? And is it right that the subject should be compulsory? These awkward issues are confronted in this...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy