Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities

Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled Machine Vision) clearly and systematically presents the basic methodology of computer and machine vision, covering the essential elements of the theory while emphasizing algorithmic and practical design constraints. This fully revised fourth edition has...

Operational Risk with Excel and VBA: Applied Statistical Methods for Risk Management (Wiley Finance)
Operational Risk with Excel and VBA: Applied Statistical Methods for Risk Management (Wiley Finance)

Praise For Operational Risk with Excel and VBA

"Dr. Nigel Da Costa Lewis has produced the most exciting volume ever on operational risk modeling. It is a must for students, practitioners, risk managers, and senior executives. . . I feel this work is the first step in revolutionizing the discipline. Other books in this field tell...

The Stairway to Heaven (Book II) (2nd Book of Earth Chronicles)
The Stairway to Heaven (Book II) (2nd Book of Earth Chronicles)
Since earliest times, humanity has pondered the incomprehensible mysteries of the universe, life...and the afterlife. Was there somewhere on Earth where, after death, mortal man could join the immortal Gods? Where was this place? By whom was it established? And does it still exist today? After years of painstaking research--combining recent...
Management Development (Training & Development)
Management Development (Training & Development)
ExpressExec is a completely up-to-date resource of current business
practice, accessible in a number of ways – anytime, anyplace,
anywhere. ExpressExec combines best practice cases, key ideas, action
points, glossaries, further reading, and resources.

Each module contains 10 individual titles that cover all the
...
Information Theory, Inference and Learning Algorithms
Information Theory, Inference and Learning Algorithms
"...a valuable reference...enjoyable and highly useful." American Scientist

"...an impressive book, intended as a class text on the subject of the title but having the character and robustness of a focused encyclopedia. The presentation is finely detailed, well documented, and stocked with artistic flourishes."
...
WAP: A Beginner's Guide
WAP: A Beginner's Guide

Get unplugged for the wireless Internet revolution

Start building wireless Web applications and Web sites for the next generation of cellular telephones and Internet devices with the in-depth information contained in this volume. WAP: A Beginner's Guide is an authoritative yet easy-to-understand reference that covers every...

Enterprise, Business-Process and Information Systems Modeling: 12th International Conference
Enterprise, Business-Process and Information Systems Modeling: 12th International Conference

This book contains the proceedings of two long-running events held in connection to the CAiSE conferences relating to the areas of enterprise, business-process and information systems modeling:

• The 12th International Conference on Business Process Modeling, Development and Support (BPMDS 2011) • The 16th...

Communication Networks And Computer Systems (Communications and Signal Processing)
Communication Networks And Computer Systems (Communications and Signal Processing)
Communication networks and computer systems research is entering a new phase in which many of the established models and techniques of the last twenty years are being challenged. The research community is continuing to free itself from past intellectual constraints so that it may fully exploit the convergence of computing and communications....
Europe For Dummies (Dummies Travel)
Europe For Dummies (Dummies Travel)
Explore the best of Europe with confidence!

From London and Paris to Tuscany and Greece, Europe has enough cities and sights to last a lifetime. To make the most of your time, take this fun, straightforward guide with you — and experience new adventures in the Old World.

Discover

  • Down-to-earth...
Deadly Connections: States that Sponsor Terrorism
Deadly Connections: States that Sponsor Terrorism
"Dan Byman has written what will likely become the standard text on state-sponsored terrorism. Deadly Connections is an important book that not only fills a long-standing gap in the field of terrorism studies, but significantly advances our understanding of this particularly opaque and complex phenomenon." --Bruce Hoffman, author of...
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy