Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Digital Integrated Circuits: A Design Perspective
Digital Integrated Circuits: A Design Perspective
Intended for use in an undergraduate senior-level digital circuit design class. Advanced material appropriate for graduate courses.Progressive in content and form, this practical text successfully bridges the gap between the circuit perspective and system perspective of digital integrated circuit design. Beginning with solid discussions on the...
Syntactic Carpentry: An Emergentist Approach to Syntax
Syntactic Carpentry: An Emergentist Approach to Syntax
Syntactic Carpentry: An Emergentist Approach to Syntax presents a groundbreaking approach to the study of sentence formation. Building on the emergentist thesis that the structure and use of language is shaped by more basic, non-linguistic forces—rather than by an innate Universal Grammar—William O'Grady shows how the defining...
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Cellular Computing (Genomics and Bioinformatics)
Cellular Computing (Genomics and Bioinformatics)
The field of cellular computing is a novel and exciting development at the intersection of biology, computer science, mathematics, and engineering. Practitioners in this emerging discipline are concerned with the analysis, modeling, and engineering of inter- and intra-cellular processes for the purposes of computation. Developments in the field...
Digital Integrated Circuits (2nd Edition)
Digital Integrated Circuits (2nd Edition)
Intended for use in undergraduate senior-level digital circuit design courses with advanced material sufficient for graduate-level courses. Progressive in content and form, this text successfully bridges the gap between the circuit perspective and system perspective of digital integrated circuit design. Beginning with solid discussions on the...
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform
Hands-On Kubernetes on Azure: Run your applications securely and at scale on the most widely adopted orchestration platform

Efficiently deploy and manage Kubernetes clusters on a cloud

Key Features

  • Deploy highly scalable applications with Kubernetes on Azure
  • Leverage AKS to deploy, manage, and operations of Kubernetes
  • Gain best practices from this guide to increase efficiency...
Atari Roots
Atari Roots
Many books have been written about 6502 assembly language. But this book is different in several important ways. Until now, there have been two main kinds of books about 6502 assembly language. There are generic books that make no mention of Atari computers, and there are reference books that...
Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.

Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that...

JUNOS Enterprise Routing: A Practical Guide to JUNOS Software and Enterprise Certification
JUNOS Enterprise Routing: A Practical Guide to JUNOS Software and Enterprise Certification
The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical foundation that...
Introduction to Online Payments Risk Management
Introduction to Online Payments Risk Management

If you've been tasked with building a team to handle risk management for online payments (RMP), this practical introduction provides a framework for choosing the technologies and personnel you need. Author and financial services executive Ohad Samet explains the components of payments risk management, and presents a coherent...

Creating Location Services for the Wireless Web
Creating Location Services for the Wireless Web
Creating Location Services for the Wireless Web
Professional Developer's Guide

Location services are emerging as one of the most important and anticipated tools of the new wireless Web. For instance, these services enable you to instantly get a map of where you are using your handheld device. Or, by pressing one key, you
...
unlimited object storage image
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy