 |
|
 |  |  |  |  Build Your Own Security Lab: A Field Guide for Network TestingWelcome to Build Your Own Security Lab. With this book, you can increase your hands-on IT security skills. The techniques and tools discussed in this book can benefit IT security designers and implementers. IT security designers will benefit as they learn more about specific tools and their capabilities. Implementers will gain firsthand experience... |
|
 Consciousness ExplainedConsciousness is notoriously difficult to explain. On one hand, there are facts about conscious experience--the way clarinets sound, the way lemonade tastes--that we know subjectively, from the inside. On the other hand, such facts are not readily accommodated in the objective world described by science. How, after all, could the reediness of... |  |  |  |  Handbook of Industrial Mixing: Science and PracticeMixing as a discipline has evolved from foundations that were laid in the 1950s, culminating in the publication of works by Uhl and Gray (1966) and Nagata (1975). Over the last 30 years, many engineering design principles have been developed, and design of mixing equipment for a desired process objective has become possible. This handbook is a... |
|
 Process Improvement with CMMI® v1.2 and ISO StandardsIn this age of globalization, process improvement practitioners must be able to comprehend and work with the different standards and frameworks used around the world. While many systems and software engineering organizations rely on a single standard as the primary driver of process improvement efforts (CMMI®-based process improvement in the... |  |  Integration of Alternative Sources of EnergyOur goal in writing this book was to discuss the ‘‘electrical side’’ of alternative energy sources. From the beginning, we felt that this approach would be a challenge that would be very difficult to fulfill. Most of the current technical work explores just one or two types of alternative energy sources, but the integration... |  |  The Worlds Most Haunted Places: From The Secret Files Of Ghostvillage.comGhostly legends abound wherever history has made its mark-from battlefields to monuments, prisons to inns. If these places have existed for centuries or more, and if they are where history-especially tragic history-was made, ghost stories will inevitably follow. The World's Most Haunted Places: From the Secret Files of Ghostvillage.com explores... |
|
 System-on-a-Chip Verification - Methodology and TechniquesSystem-On-a-Chip Verification: Methodology and Techniques is the first book to cover verification strategies and methodologies for SOC verification from system level verification to the design sign- off. The topics covered include Introduction to the SOC design and verification aspects, System level verification in brief, Block level... |  |  iPhone SDK Application Development: Building Applications for the AppStoreThis practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK... |  |  Integrated Life Cycle Design of StructuresTraditionally the process of design has concentrated on the construction phase itself, with the primary objective being to optimize efficiency and minimize costs during development and construction. With the move towards more sustainable development comes the need for this short-term approach to be expanded to encompass the entire service life of... |
|
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 |