Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intrusion Detection and Prevention
Intrusion Detection and Prevention

In today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,...

Sams Teach Yourself TCP/IP in 24 Hours, Third Edition
Sams Teach Yourself TCP/IP in 24 Hours, Third Edition
Welcome to Sams Teach Yourself TCP/IP in 24 Hours, Third Edition. This book provides a clear and concise introduction to TCP/IP for newcomers, and also for users who have worked with TCP/IP but would like a little more of the inside story. The third edition includes new material on recent developments in TCP/IP and...
Small Fatigue Cracks: Mechanics, Mechanisms and Applications
Small Fatigue Cracks: Mechanics, Mechanisms and Applications

This book contains the fully peer-reviewed papers presented at the Third Engineering Foundation Conference on Small Fatigue Cracks, held under the chairmanship of K.S. Ravichandran and Y. Murakami during December 6-11, 1998, at the Turtle Bay Hilton, Oahu, Hawaii. This book presents a state-of-the-art description of the mechanics, mechanisms...

Learn BlackBerry Games Development
Learn BlackBerry Games Development

BlackBerry smart phones aren’t just for business. In fact, throw away that boring spreadsheet, tear up that yearly budget report—the BlackBerry is a lean, mean game-playing machine. Carol Hamer and Andrew Davison, expert software game developers, show you how to leverage the BlackBerry Java™ Development Environment (based on...

Advances in Smart System Technologies: Select Proceedings of ICFSST 2019 (Advances in Intelligent Systems and Computing, 1163)
Advances in Smart System Technologies: Select Proceedings of ICFSST 2019 (Advances in Intelligent Systems and Computing, 1163)
This book presents select peer-reviewed proceedings of the International Conference on Frontiers in Smart Systems Technologies (ICFSST 2019). It focuses on latest research and cutting-edge technologies in smart systems and intelligent autonomous systems with advanced functionality. Comprising topics related to diverse aspects of smart...
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Science is a swarm.

To the layperson, the stereotypical scientist is logical, clear-thinking, wellinformed but perhaps socially awkward, carefully planning his or her experiments and then analyzing the resulting data deliberately, with precision. The scientist works alone, emotion-free, searching only for truth, having been well advised
...
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary.

Pattern Recognition...

Grid Computing Security
Grid Computing Security
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and...
The Semantic Web: Crafting Infrastructure for Agency
The Semantic Web: Crafting Infrastructure for Agency
The Semantic Web is an idea of World Wide Web inventor Tim Berners-Lee that the Web as a whole can be made more intelligent and perhaps even intuitive about how to serve a users needs. Although search engines index much of the Web's content, they have little ability to select the pages that a user really wants or needs. Berners-Lee foresees a...
Trends in Functional Programming 6
Trends in Functional Programming 6
This book contains selected papers from the proceedings presented at the Sixth Symposium on Trends in Functional Programming (TFP05). Continuing the TFP series with its previous instances held in Stirling (1999), St. Andrews (2000), Stirling (2001), Edinburgh (2003) and Munich (2004) the symposium was held in Tallinn, Estland in co-location with...
The IMS : IP Multimedia Concepts and Services in  the Mobile Domain
The IMS : IP Multimedia Concepts and Services in the Mobile Domain
We have telephony to talk to each other, messaging to dispatch mail or instant messages, browsing to read published content and search engines to locate content sites. However, current mobile networks do not provide the possibility for one application rich terminal to communicate with another in a peer-to-peer session beyond voice calls. Mobile...
Architecting Dependable Systems (Lecture Notes in Computer Science)
Architecting Dependable Systems (Lecture Notes in Computer Science)
As software systems become more and more ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be planned at the beginning of the design process, it is appropriate that these issues be addressed at the architectural level. This book is inspired by the ICSE 2002 Workshop on Architecting...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy