Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)
Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)

This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology...

Hidden Unity in Nature's Laws
Hidden Unity in Nature's Laws
One of the paradoxes of the physical sciences is that as our knowledge has progressed, more and more diverse physical phenomena can be explained in terms of fewer underlying laws, or principles. In Hidden Unity, eminent physicist John Taylor puts many of these findings into historical perspective and documents how progress is made when unexpected,...
Ninja Mind Control
Ninja Mind Control
Now you can unlock the ancient secrets of Ninja mind control and discover for yourself the fantastic powers of the legendary Ninja warriors. By combining simple methods of meditation with aggressive maneuvers, you can become the master of any situation--from the author of Ninja Secrets of Invisibility.

NINJA MIND CONTROL is, without
...
Mechanical Behaviour of Engineering Materials: Metals, Ceramics, Polymers, and Composites
Mechanical Behaviour of Engineering Materials: Metals, Ceramics, Polymers, and Composites
Components used in mechanical engineering usually have to bear high mechanical loads. It is, thus, of considerable importance for students of mechanical engineering and materials science to thoroughly study the mechanical behaviour of materials. There are different approaches to this subject: The engineer is mainly interested in design rules to...
Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors
Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors

Computer architecture is at a turning point. Radical changes occurred in the 1980s when the Reduced Instruction Set Computer (RISC) philosophy, spurred in good part by academic research, permeated the industry as a reaction to the Complex Instruction Set Computer (CISC) complexities. Today, three decades later, we have reached a point where...

Power-Constrained Testing of VLSI Circuits (Frontiers in Electronic Testing)
Power-Constrained Testing of VLSI Circuits (Frontiers in Electronic Testing)

Increased levels of chip integration combined with physical limitations of heat removal devices, cooling mechanisms and battery capacity, have established energy-efficiency as an important design objective in the implementation flow of modern electronic products. To meet these low energy objectives, new low power techniques, including...

Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
This book presents and discusses research in the study of computer science. Topics discussed include fuzzy logic in molecular computing; mobile database computing; learning methods for spam filtering; heterogeneous systems; nested relational database systems; advanced array processing techniques and systems and swarm intelligence....
The Drinking Water Handbook, Second Edition
The Drinking Water Handbook, Second Edition

When you open the tap to fill your glass with drinking water, you expect the water to be of good quality. But is the water from your tap really safe? The second edition of an industry-wide bestseller, The Drinking Water Handbook explains the many processes employed to make water safe to drink. Starting at the source, it...

Mathematical Models for Poroelastic Flows (Atlantis Studies in Differential Equations)
Mathematical Models for Poroelastic Flows (Atlantis Studies in Differential Equations)

The book is devoted to rigorous derivation of macroscopic mathematical models as a homogenization of exact mathematical models at the microscopic level. The idea is quite natural: one first must describe the joint motion of the elastic skeleton and the fluid in pores at the microscopic level by means of classical continuum mechanics, and then...

CDO & MAPI Programming with Visual Basic:: Developing Mail and Messaging Applications
CDO & MAPI Programming with Visual Basic:: Developing Mail and Messaging Applications

Computers and devices are more connected now than ever before. Why? Because the humans who use those computers need to collaborate. We need to share information, and we need to do it quickly, without regard to the physical distance that separates us. Corporate solution developers now more than ever have the opportunity and responsibility to...

Fundamentals of Wireless Communication
Fundamentals of Wireless Communication
Wireless communication is one of the most vibrant areas in the communication
field today. While it has been a topic of study since the 1960s,
the past decade has seen a surge of research activities in the area. This is
due to a confluence of several factors. First, there has been an explosive
increase in demand for tetherless
...
unlimited object storage image
Result Page: 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy