|
|
|
|
|
|
Out of the Inner Circle: A Hacker's Guide to Computer Security
This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system.... | | Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex
systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is
usually not taught at ... | | 3D Printing with SketchUp
Real-world case studies to help you design models in SketchUp for 3D printing on anything ranging from the smallest desktop machines to the largest industrial 3D printers
Overview
-
Learn how to design beautiful architectural models that will print on any 3D printer
-
Packed with clearly...
|
|
| | Computer Viruses: from theory to applications (Collection IRIS)This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions... | | |
|
|
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 |