Home | Amazing | Today | Tags | Publishers | Years | Search 
Cryptography in C and C++
Cryptography in C and C++

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic...

Time and Petri Nets
Time and Petri Nets

At first glance the concepts of time and of Petri nets are quite contrary: while time determines the occurrences of events in a system, classic Petri nets consider their causal relationships and they represent events as concurrent systems. But if we take a closer look at how time and causality are intertwined we realize that there are many...

Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Innovations in Intelligent Machines -3: Contemporary Achievements in Intelligent Systems
Innovations in Intelligent Machines -3: Contemporary Achievements in Intelligent Systems

This book aims to promote a sample of current theoretical and application oriented intelligent systems research specifically in the field of neural networks computing. It presents examples of experimental and real-world investigations that demonstrate contemporary achievements and advances in the area of intelligent systems.

This...

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Imbalanced Learning: Foundations, Algorithms, and Applications
Imbalanced Learning: Foundations, Algorithms, and Applications

The first book of its kind to review the current status and future direction of the exciting new branch of machine learning/data mining called imbalanced learning

Imbalanced learning focuses on how an intelligent system can learn when it is provided with imbalanced data. Solving imbalanced learning problems is critical in...

Press On: Principles of Interaction Programming
Press On: Principles of Interaction Programming

Interactive systems and devices, from mobile phones to office copiers, do not fulfill their potential for a wide variety of reasons--not all of them technical. Press On shows that we can design better interactive systems and devices if we draw on sound computer science principles. It uses state machines and graph theory as a powerful and...

How Electronic Things Work... And What to do When They Don't
How Electronic Things Work... And What to do When They Don't

Electronic equipment 'on the blink'? Don't junk it or pay sky-high repair costs - fix it yourself! Here's a guide to understanding and repairing electronics equipment written for people who would ordinarily 'call the shop'. With this fully illustrated, simple-to-use guide, you will get a grasp of the workings of the...

Frommer's Las Vegas 2013 (Frommer's Color Complete)
Frommer's Las Vegas 2013 (Frommer's Color Complete)

 Full-color throughout

 Completely updated every year

  • Insider advice on navigating the Strip as you explore some of that landmark street’s famous casino hotels and attractions, from Mandalay Bay’s wave pool and CityCenter’s public art displays to The...
A History of Computing Technology, 2nd Edition
A History of Computing Technology, 2nd Edition

This second edition of the popular reference and textbook outlines the historical developments in computing technology. The book describes historical aspects of calculation and concentrates on the physical devices used to aid people in their attempts at automating the arithmetic process.

A History of Computing Technology...

Making Things Move DIY Mechanisms for Inventors, Hobbyists, and Artists
Making Things Move DIY Mechanisms for Inventors, Hobbyists, and Artists

A unique guide to practical mechanical design principles and their applications
In Making Things Move, you'll learn how to build moving mechanisms through non-technical explanations, examples, and do-it-yourself projects--from art installations to toys to labor-saving devices. The projects include a drawing machine,
...

Vagrant: Up and Running
Vagrant: Up and Running

Discover why Vagrant is a must-have tool for thousands of developers and ops engineers. This hands-on guide shows you how to use this open source software to build a virtual machine for any purpose—including a completely sandboxed, fully provisioned development environment right on your desktop.

Vagrant creator...

Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy