Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...

Complete Adobe Photoshop CS4 for Digital Photographers
Complete Adobe Photoshop CS4 for Digital Photographers

Learn how to get the most out of all the newest features of Photoshop and improve your images with "Complete Adobe Photoshop CS4 for Digital Photographers." Photoshop is the new darkroom, providing instant results and making professional-level tools accessible even to amateurs. This new edition of the book is filled with brand new...

Programming Windows Phone 7
Programming Windows Phone 7

This book is a gift from the  Windows Phone 7 team at Microsoft to the programming community, and I am proud to have been  a part of  it. Within the pages that follow, I show you the basics of writing applications for  Windows Phone 7 using the C#  programming language with the Silverlight and XNA 2D frameworks.

...
TCP/IP Sockets in Java: Practical Guide for Programmers (The Practical Guides)
TCP/IP Sockets in Java: Practical Guide for Programmers (The Practical Guides)

Most Internet applications use sockets to implement network communication protocols. TCP/IP Sockets in Java: Practical Guide for Programmers, with its focused, tutorial-based coverage, helps you master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Later chapters teach you to implement...

Compared to What?: An Introduction to the Anaylsis of Algorithms
Compared to What?: An Introduction to the Anaylsis of Algorithms

I am very pleased to have this new book in the Aho/Ullman series Principles of Computer Science. I see this book as a major step toward making computer science theory accessible to the wide range of students who need to know the subject. It covers a good segment of the classical material on data structures and algorithms, but it does so in a...

Categorical Data Analysis With Sas and Spss Applications
Categorical Data Analysis With Sas and Spss Applications

This book is primarily designed for a senior undergraduate class in Categorical Data Analysis and for majors in biomedical, biostatistics and statistics programs, but can also be used as reference text for researchers working in the area, and /or for an introductory text in a graduate course on the subject. A prerequisite of a one year...

Mathematics for Computer Graphics Applications
Mathematics for Computer Graphics Applications

Computer graphics is more than an isolated discipline at an intersection of computer science, mathematics, and engineering. It is the very visible leading edge of a revolution in how we use computers and automation to enhance our lives. It has changed forever the worlds of engineering and science, medicine, and the media, too. The wonderful...

The Verilog® Hardware Description Language
The Verilog® Hardware Description Language

The Verilog language is a hardware description language that provides a means of specifying a digital system at a wide range of levels of abstraction. The language supports the early conceptual stages of design with its behavioral level of abstraction, and the later implementation stages with its structural abstractions. The language includes...

Guide to Intelligent Data Analysis: How to Intelligently Make Sense of Real Data (Texts in Computer Science)
Guide to Intelligent Data Analysis: How to Intelligently Make Sense of Real Data (Texts in Computer Science)

The main motivation to write this book came from all our problems to find suitable material for a textbook that would really help us to teach the practical aspects of data analysis together with the needed theoretical underpinnings. Many books out there tackle either one or the other of these aspects (and, especially for the latter, there are...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

3G, HSPA and FDD versus TDD Networking: Smart Antennas and Adaptive Modulation
3G, HSPA and FDD versus TDD Networking: Smart Antennas and Adaptive Modulation

3G, HSPA and FDD versus TDD Networking, Second Edition is the only book that contrasts the network capacity gains that may be achieved with the advent of adaptive antenna arrays and HSDPA-style adaptive modulation techniques in the context of FDD and TDD CDMA cellular networks.  In the five years since the first edition of this...

Logic and Language Models for Computer Science
Logic and Language Models for Computer Science

So you are a computer science (CS) major and you are sitting down to see what this book is about. It has been assigned, the course is required, you have no choice. Still you chose your institution, your major. Maybe your instructor made a good choice. Let's hope so.

Okay, you are not a computer science major, perhaps not even a...

Result Page: 286 285 284 283 282 281 280 279 278 277 276 275 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy