Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Handbook of RF and Microwave Power Amplifiers (The Cambridge RF and Microwave Engineering Series)
Handbook of RF and Microwave Power Amplifiers (The Cambridge RF and Microwave Engineering Series)
In 1989, I was responsible for organizing a workshop at the European Microwave Conference on High-Power Solid State Amplifiers. This workshop proved popular and so Artech House asked me to persuade the speakers to turn their material into a formsuitable for publication, the result was the book entitled “High-Power GaAs FET...
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers

This book masterfully illuminates extremely simple, but overwhelmingly powerful metrics, models, and methods for designing professional business cases while the author demystifies esoteric concepts in ROI.


An indispensable addition to your...

Kalman Filtering: Theory and Practice Using MATLAB
Kalman Filtering: Theory and Practice Using MATLAB

From Reviews of the First Edition

"An authentic magnum opus worth much more than its weight in gold!"
IEEE Transactions on Automatic Control

The proven textbook on Kalman filtering—now fully updated, revised, and expanded

...

Java How to Program, 7th Edition
Java How to Program, 7th Edition

The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. The Seventh Edition has been extensively fine-tuned and is completely up-to-date with Sun Microsystems, Inc.’s...

Practical Data Science Cookbook - Real-World Data Science Projects to Help You Get Your Hands On Your Data
Practical Data Science Cookbook - Real-World Data Science Projects to Help You Get Your Hands On Your Data

Key Features

  • Learn how to tackle every step in the data science pipeline and use it to acquire, clean, analyze, and visualize data
  • Get beyond the theory with real-world projects
  • Expand your numerical programming skills through step-by-step code examples and learn more about the robust...
The Metacolonial State: Pakistan, Critical Ontology, and the Biopolitical Horizons of Political Islam (Antipode Book Series)
The Metacolonial State: Pakistan, Critical Ontology, and the Biopolitical Horizons of Political Islam (Antipode Book Series)

'An urgent and extraordinary book. Weaving a philosophical analysis of Heidegger, Agamben and Foucault, Jan draws out the implications of their thought for a radical analysis of the ontological politics of Islam and Pakistan. Whether writing about the 'Ulama and Deoband schools, blasphemy laws, the military, beards, or the...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Software Design for Resilient Computer Systems
Software Design for Resilient Computer Systems

This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. With this second edition of Software Design for Resilient Computer Systems the book is thoroughly updated to contain the newest advice...

C++ How to Program (5th Edition)
C++ How to Program (5th Edition)
Welcome to C++ and C++ How to Program, Fifth Edition! C++ is a world-class programming language for developing industrial-strength, high-performance computer applications. We believe that this book and its support materials have everything instructors and students need for an informative, interesting, challenging...
Professional Java, JDK 5 Edition
Professional Java, JDK 5 Edition
Java continues to be the dominant language for building server applications, and the latest update to the Java platform—JDK 5—boasts many new features, including a metadata facility, generics, autoboxing, and improved user interface performance. Building upon Ivor Horton's Beginning Java, this book provides insight into these...
The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy