Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Introducing Visual C# 2010
Introducing Visual C# 2010

If you’re new to C# programming, this book is the ideal way to get started. Respected author Adam Freeman guides you through the C# language by carefully building up your knowledge from fundamental concepts to advanced features.

The book gradually builds up your knowledge, using the concepts you have
...

Software Automatic Tuning: From Concepts to State-of-the-Art Results
Software Automatic Tuning: From Concepts to State-of-the-Art Results

Software automatic tuning is a technology paradigm enabling software adaptation to a variety of computational conditions. Originating from the stream of research works on highperformance computing, it is considered to be the most promising approach to the required performance advancements on the next generation supercomputing platforms. Also,...

Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
Thin Films and Coatings in Biology (Biological and Medical Physics, Biomedical Engineering)
Thin Films and Coatings in Biology (Biological and Medical Physics, Biomedical Engineering)

The surface of materials is routinely exposed to various environmental influences. Surface modification presents a technological challenge for material scientists, physicists, and engineers, particularly when those surfaces are subjected to function within human body environment. This book provides a comprehensive coverage of the major issues...

Marine Pollution and Human Health (Issues in Environmental Science and Technology)
Marine Pollution and Human Health (Issues in Environmental Science and Technology)
There is growing concern about the state of the world's oceans. The rapid growth of human populations in coastal regions has led to increasing dependence on marine resources. Beneficial features related to food supply and life style need to be balanced against the hazards presented by microbial pathogens, chemical pollutants, and toxic algal...
ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data
Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data

A major limitation of conventional web sites is their unorganized and isolated contents, which is created mainly for human consumption. This limitation can be addressed by organizing and publishing data, using powerful formats that add structure and meaning to the content of web pages and link related data to one another. Computers can...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Learn TensorFlow 2.0: Implement Machine Learning and Deep Learning Models with Python
Learn TensorFlow 2.0: Implement Machine Learning and Deep Learning Models with Python
Learn how to use TensorFlow 2.0 to build machine learning and deep learning models with complete examples. 

The book begins with introducing TensorFlow 2.0 framework and the major changes from its last release. Next, it focuses on building Supervised Machine Learning models using TensorFlow 2.0.
...
Bayesian Statistics the Fun Way: Understanding Statistics and Probability with Star Wars, LEGO, and Rubber Ducks
Bayesian Statistics the Fun Way: Understanding Statistics and Probability with Star Wars, LEGO, and Rubber Ducks
Fun guide to learning Bayesian statistics and probability through unusual and illustrative examples.

Probability and statistics are increasingly important in a huge range of professions. But many people use data in ways they don't even understand, meaning they aren't getting the most from it. Bayesian
...
More Than Enough: Claiming Space for Who You Are (No Matter What They Say)
More Than Enough: Claiming Space for Who You Are (No Matter What They Say)
INSTANT NEW YORK TIMES BESTSELLER

WINNER OF THE 2020 NAACP IMAGE AWARD FOR OUTSTANDING LITERARY WORK — BIOGRAPHY/AUTOBIOGRAPHY

NOW OPTIONED FOR DEVELOPMENT AS A TV SERIES BY PARAMOUNT TELEVISION STUDIOS AND ANONYMOUS CONTENT


“The
...
unlimited object storage image
Result Page: 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy