Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)
As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)

In the dramatic few years when colonial Americans were galvanized to resist British rule, perhaps nothing did more to foment anti-British sentiment than the armed occupation of Boston. As If an Enemy's Country is Richard Archer's gripping narrative of those critical months between October 1, 1768 and the winter of 1770 when Boston was...

Strategic Software Engineering
Strategic Software Engineering
Software is a disruptive technology that has changed how almost every
sector of human society and the economy works. Software is now pervasive;
it is a component of almost every industrial product or at least
essential to the development of such products. Software capabilities lie at
the core of the new national and
...
Sparse Representations and Compressive Sensing for Imaging and Vision (SpringerBriefs in Electrical and Computer Engineering)
Sparse Representations and Compressive Sensing for Imaging and Vision (SpringerBriefs in Electrical and Computer Engineering)

Compressed sensing or compressive sensing is a new concept in signal processing where one measures a small number of non-adaptive linear combinations of the signal.  These measurements are usually much smaller than the number of samples that define the signal.  From these small numbers of measurements, the signal is then...

Responsive Web Design with jQuery
Responsive Web Design with jQuery

With so many varied devices browsing the Internet, websites need to react correctly to many different situations. This book will show you how to use JQuery plugins to build responsive websites quickly, accurately, and easily.

Overview

  • Learn to swiftly design responsive websites by harnessing the power of...
Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
An implementer’s guide to setting up, configuring, and managing a secure wireless network

Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Wastewater Pathogens (Wastewater Microbiology)
Wastewater Pathogens (Wastewater Microbiology)
A practical guide to wastewater pathogens

Wastewater treatment professionals face daily exposure to a wide variety of pathogens. These include viruses, bacteria, fungi, protozoa, and helminthes, as well as allergins, endotoxins, and exotoxins. While generally minimal, potential health hazards are still cause for concern....

Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Software Metrics and Software Metrology
Software Metrics and Software Metrology

Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at the classical metrology concepts from science and engineering, using them as criteria to propose an approach to analyze the design of current software measures and then design new software...

Introduction to Data Analysis and Graphical Presentation in Biostatistics with R: Statistics in the Large (SpringerBriefs in Statistics)
Introduction to Data Analysis and Graphical Presentation in Biostatistics with R: Statistics in the Large (SpringerBriefs in Statistics)

Through real-world datasets, this book shows the reader how to work with material in biostatistics using the open source software R. These include tools that are critical to dealing with missing data, which is a pressing scientific issue for those engaged in biostatistics. Readers will be equipped to run analyses and make graphical...

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...

International Conference on Advanced Computing Networking and Informatics: ICANI-2018 (Advances in Intelligent Systems and Computing)
International Conference on Advanced Computing Networking and Informatics: ICANI-2018 (Advances in Intelligent Systems and Computing)
This AISC volume contains documented versions of the papers presented at the International Conference on Advanced Computing, Networking and Informatics (ICANI-2018). The conference was held during February 22–24, 2018, at Medi-Caps University, Indore (Madhya Pradesh), India. The conference was a platform for...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy