Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Computational Models of Reading: A Handbook (OXFORD SERIES ON COGNITIVE MODELS)
Computational Models of Reading: A Handbook (OXFORD SERIES ON COGNITIVE MODELS)
This book is about computational models of reading, or models that explain (and often simulate) the mental processes that allow us to convert the marks on a printed page into the representations that allow us to understand the contents of what we are reading. Computational Models of Reading
assumes no prior knowledge of the
...
Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
This book outlines an integrative framework for business-model innovation in the paradigm of the Internet of Things. It elaborates several tools and methodologies for the quantitative, qualitative, analytical and effectual evaluation, and analyzes their applicability and efficiency for several phases of the business-model innovation process. As...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Active Vibration Control and Stability Analysis of Flexible Beam Systems
Active Vibration Control and Stability Analysis of Flexible Beam Systems
Control of flexible beam systems constitutes an important benchmark problem in many application areas, such as flexible manipulators for grasping, marine mooring lines for station keeping, marine risers for oil transportation, and crane cables for positioning the payload. Flexible systems have a number of advantages...
Forensic Human Factors and Ergonomics: Case Studies and Analyses
Forensic Human Factors and Ergonomics: Case Studies and Analyses

This book has 18 case study chapters investigating various injury scenarios through the use of a Human Factors and Ergonomics (HFE) analysis. Each injury scenario derives from one or more similar lawsuits (but names, places and some of the details are fictionalized). The scenarios describe a ‘slice of life’ of people...

Interpolation and Realization Theory with Applications to Control Theory: In Honor of Joe Ball (Operator Theory: Advances and Applications, 272)
Interpolation and Realization Theory with Applications to Control Theory: In Honor of Joe Ball (Operator Theory: Advances and Applications, 272)

This volume is devoted to Joseph A. (Joe) Ball’s contributions to operator theory and its applications and in celebration of his seventieth birthday.

Joe Ball’s career spans over four and a half decades, starting with his work on model theory and related topics for non-contractions and operators...

The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites
The combination of PHP and MySQL is the most convenient approach to dynamic, database-driven web design, holding its own in the face of challenges from integrated frameworks—such as Ruby on Rails—that are harder to learn. Due to its open source roots (unlike the competing Microsoft .NET framework), it is...
Deep Learning Cookbook: Practical Recipes to Get Started Quickly
Deep Learning Cookbook: Practical Recipes to Get Started Quickly

Deep learning doesn’t have to be intimidating. Until recently, this machine-learning method required years of study, but with frameworks such as Keras and Tensorflow, software engineers without a background in machine learning can quickly enter the field. With the recipes in this cookbook, you’ll learn how to solve...

Professional Cross-Platform Mobile Development in C#
Professional Cross-Platform Mobile Development in C#

PEOPLE TAKE UP MOBILE DEVELOPMENT these days for a lot of reasons. For some it is all about learning something new, but for many it comes out of necessity of a job or career. Perhaps you see mobile development as the next big thing, just like client-server development was in the 1990s, or web development became in the 2000s. Maybe...

unlimited object storage image
Result Page: 272 271 270 269 268 267 266 265 264 263 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy