Home | Amazing | Today | Tags | Publishers | Years | Search 
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach

When computer software succeeds—when it meets the needs of the people who use it, when it performs flawlessly over a long period of time, when it is easy to modify and even easier to use—it can and does change things for the better. But when software fails—when its users are dissatisfied, when it is error prone, when...

Database Processing (12th Edition)
Database Processing (12th Edition)

The 12th edition of Database Processing: Fundamentals, Design, and Implementation refines the organization and content of this classic textbook to reflect a new teaching and professional workplace environment. Students and other readers of this book will benefit from new content and features in this edition.

...
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on,...

Representations and Techniques for 3D Object Recognition & Scene Interpretation
Representations and Techniques for 3D Object Recognition & Scene Interpretation

3D scene understanding and object recognition are among the grandest challenges in computer vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo, edge detection, and segmentation, could be viewed as subtasks within scene understanding and recognition. Many of these applicable methods are...

Programming Like a Pro for Teens
Programming Like a Pro for Teens

Are you ready to learn how to program a computer? You'll do just that in this book. PROGRAMMING LIKE A PRO FOR TEENS is written in a friendly, unassuming voice that makes it possible for you to master the ideas and concepts that professionals use for programming every day. You learn algorithmic thinking and problem-solving in addition to...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

The Nested Universal Relation Database Model (Lecture Notes in Computer Science)
The Nested Universal Relation Database Model (Lecture Notes in Computer Science)

During the 1980's the flat relational model (relational model), which was initiated by Codd in 1970, gained immense popularity and acceptance in the market place. One of the main reasons for this success is that the relational model provides physical data independences i.e. changing the physical organization of the database does not...

Knowledge Representation and Reasoning Under Uncertainty: Logic at Work
Knowledge Representation and Reasoning Under Uncertainty: Logic at Work

This volume is based on the International Conference Logic at Work, held in Amsterdam, The Netherlands, in December 1992. The 14 papers in this volume are selected from 86 submissions and 8 invited contributions and are all devoted to knowledge representation and reasoning under uncertainty, which are core issues of formal artificial...

Alfresco 3 Records Management
Alfresco 3 Records Management

This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software...

C: A Reference Manual (5th Edition)
C: A Reference Manual (5th Edition)

This text is a reference manual for the C programming language. OUf aim is to provide a complete and precise discussion of the language, the run-time libraries. and a style of C programming that emphasizes correctness, portability, and maintainability.

We expect our readers to already understand basic programming concepts, and many...

Programming Language Pragmatics, Third Edition
Programming Language Pragmatics, Third Edition

A course in computer programming provides the typical student's first exposure to the field of computer science. Most students in such a course will have used computers all their lives, for email, games, web browsing, word processing, social networking, and a host of other tasks, but it is not until they write their first programs that...

Result Page: 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy