Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Controlled Genetic Manipulations (Neuromethods, Vol. 65)
Controlled Genetic Manipulations (Neuromethods, Vol. 65)

The current demand for the development of techniques for controlled genetic manipulations is driven by the anatomical and physiological complexity of the brain and by the need for experimental models that can address this complexity through selective manipulation of defined components of the system: specific neuronal populations or selected...

Extreme Programming for Web Projects
Extreme Programming for Web Projects

Web development teams have been operating in the dark for far too long. The lack of proven development methodologies for the Web environment has resulted in a constant struggle for developers to produce quality Web-based projects on time and within budget. The field is multidisciplinary in character, involving both technology and...

Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
New automated, application-independent methodology for designing and deploying sensor networks

Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based...

Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)

People go about their daily tasks with an in-built awareness of their social and physical environments. This awareness helps them to work cooperatively in groups, coordinate actions, and to maintain and enhance social communication with others. Networked technology has extended the reach of people's awareness to remote and distributed groups and...

Developing C# Apps for iPhone and iPad using MonoTouch: iOS Apps Development for .NET Developers
Developing C# Apps for iPhone and iPad using MonoTouch: iOS Apps Development for .NET Developers

Developing C# Applications for iPhone and iPad using MonoTouch shows you how to use your existing C# skills to write apps for the iPhone and iPad. Fortunately, there's MonoTouch, Novell's .NET library that allows C# developers to write C# code that executes in iOS. Furthermore, MonoTouch allows you to address all the unique...

Stable Isotopes in Ecology and Environmental Science
Stable Isotopes in Ecology and Environmental Science

This book highlights new and emerging uses of stable isotope analysis in a variety of ecological disciplines. While the use of natural abundance isotopes in ecological research is now relatively standard, new techniques and ways of interpreting patterns are developing rapidly. The second edition of this book provides a thorough, up-to-date...

Visual Data Mining: The VisMiner Approach
Visual Data Mining: The VisMiner Approach

A visual approach to data mining.

Data mining has been defined as the search for useful and previously unknown patterns in large datasets, yet when faced with the task of mining a large dataset, it is not always obvious where to start and how to proceed. 

This book introduces a visual methodology for data...

Programming and Problem Solving with Visual Basic .NET
Programming and Problem Solving with Visual Basic .NET

Programming and Problem Solving with Visual Basic .NET introduces Visual Basic from an object-oriented viewpoint, with a rigor and accessibility perfect for students learning their first programming language. Rich in the pedagogical style that is the trademark of the Dale series of programming texts, this Visual Basic text provides...

How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Windows 2000 Performance Guide
Windows 2000 Performance Guide
The load your users place on your Windows 2000 servers may increase approximately linearly over time, but that's no guarantee that the servers' performance will degrade smoothly and predictably. Rather--and this is the crux of Windows 2000 Performance Guide--a modest increase in workload can often cause a significant, even catastrophic,...
Practical Food Microbiology
Practical Food Microbiology
From the reviews of previous editions:-

"much information from diverse sources concentrated in a user-friendly way. A worthwhile, well-priced book which should find its way into frequent use in many laboratories." Society for General Microbiology Quarterly

"This book is a rare creature - a text of delightful clarity,...

unlimited object storage image
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy