|
|
|
|
|
Wireless Security HandbookThis book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this... | | George Silverman's ExplanationWHAT do I know of Hoghton Towers? Very little; for I have been gratefully unwilling to disturb my first impressions. A house, centuries old, on high ground a mile or so removed from the road between Preston and Blackburn, where the first James of England, in his hurry to make money by making baronets, perhaps made some of those remunerative... | | The Calculus of Computation: Decision Procedures with Applications to VerificationComputational logic is a fast-growing field with applications in artificial intelligence, constraint solving, and the design and verification of software and hardware systems. Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art... |
|
|
|
|
Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 |