Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Classification and Learning Using Genetic Algorithms: Applications in Bioinformatics and Web Intelligence (Natural Computing Series)
Classification and Learning Using Genetic Algorithms: Applications in Bioinformatics and Web Intelligence (Natural Computing Series)
Genetic algorithms (GAs) are randomized search and optimization techniques guided by the principles of evolution and natural genetics; they have a large amount of implicit parallelism. GAs perform multimodal search in complex landscapes and provide near-optimal solutions for objective or tness func tion of an...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Software Metrics and Software Metrology
Software Metrics and Software Metrology

Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at the classical metrology concepts from science and engineering, using them as criteria to propose an approach to analyze the design of current software measures and then design new software...

Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Optimization of adaptive signal processing algorithms for wireless communications is based on a model of the underlying propagation channel. In practice, this model is never known perfectly. For example, its parameters have to be estimated and are only known with significant errors.

In this book, a systematic treatment of this practical design...

Linux Annoyances for Geeks
Linux Annoyances for Geeks
GNU/Linux is an immensely popular operating system that is both extremely stable and reliable. But it can also induce minor headaches at the most inopportune times, if you're not fully up to speed with its capabilities.

A unique approach to running and administering Linux systems, Linux Annoyances...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Learning Einstein Analytics: Unlock critical insights with Salesforce  Einstein Analytics
Learning Einstein Analytics: Unlock critical insights with Salesforce Einstein Analytics

Learn to confidently setup and create app, lenses, dashboards using Salesforce Einstein Analytics.

Key Features

  • Explore Einstein analytics on desktop as well as mobile platforms
  • Turn data into smarter sales with Einstein Analytics for Sales
  • Visualize your data with...
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Practice the IT Skills Essential for Your Success

  • 60+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results...
Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
The design and implementation of large scale telecommunication systems requires the interconnection and integration of diverse subsystems which need to provide a highly reliable system capable of offering high quality services. Over recent years, large scale systems designers have only had to deal with wireline systems and large scale operations...
Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized complexity theory is a recent branch of computational complexity theory that provides a framework for a refined analysis of hard algorithmic problems. The central notion of the theory, fixed-parameter tractability, has led to the development of various new algorithmic techniques and a whole new theory of intractability. This book is a...
Result Page: 37 36 35 34 33 32 31 30 29 28 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy