Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

GNU Emacs Pocket Reference
GNU Emacs Pocket Reference
GNU Emacs is the most popular and widespread of the Emacs family of editors. It is also the most powerful and flexible. Unlike all other text editors, GNU Emacs is a complete working environment -- you can stay within Emacs all day without leaving. The GNU Emacs Pocket Reference is a companion volume to O'Reilly's Learning GNU...
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)
Windows Server 2008 All-In-One Desk Reference For Dummies (Computer/Tech)

Covers the all-new Windows Server 2008!

Your one-stop guide to setting up, using, and maintaining Windows Server 2008

If, like many system administrators, you've been waiting impatiently for the arrival of Windows Server 2008, wait no more! It's here, and so is this book to help...

Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Linux Administration Handbook (2nd Edition)
Linux Administration Handbook (2nd Edition)
As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a...
The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

Sensitivity Analysis for Neural Networks (Natural Computing Series)
Sensitivity Analysis for Neural Networks (Natural Computing Series)

Artificial neural networks are used to model systems that receive inputs and produce outputs. The relationships between the inputs and outputs and the representation parameters are critical issues in the design of related engineering systems, and sensitivity analysis concerns methods for analyzing these relationships. Perturbations of neural...

AI Techniques for Game Programming (Premier Press Game Development)
AI Techniques for Game Programming (Premier Press Game Development)

"AI Techniques for Game Programming" takes the difficult topics of genetic algorithms and neural networks and explains them in plain English. Gone are the tortuous mathematic equations and abstract examples to be found in other books. Each chapter takes readers through the theory a step at a time, explaining clearly how they can...

Link Mining: Models, Algorithms, and Applications
Link Mining: Models, Algorithms, and Applications

This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers,...

Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal networks (STN)are spatial networks whose topology and/or attributes change with time. These are encountered in many critical areas of everyday life such as transportation networks, electric power distribution grids, and social networks of mobile users. STN modeling and computations raise significant challenges. The model must...
unlimited object storage image
Result Page: 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy