Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

100 SOA Questions: Asked and Answered
100 SOA Questions: Asked and Answered

100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer,...

Computer Vision: A Modern Approach (2nd Edition)
Computer Vision: A Modern Approach (2nd Edition)

 

Computer vision as a field is an intellectual frontier. Like any frontier, it is exciting and disorganized, and there is often no reliable authority to appeal to. Many useful ideas have no theoretical grounding, and some theories are useless in practice; developed areas are widely scattered, and
...
Digital Control and Estimation: A Unified Approach (Prentice Hall Information and System Sciences Series)
Digital Control and Estimation: A Unified Approach (Prentice Hall Information and System Sciences Series)

Many books already exist on the topics of digital control and estimation. The prospective reader of this book might well then ask. "why another book in this area?"

One problem with the existing literature is that it emphasizes the differences between discrete and continuous theory. This dichotomy is largely
...

Elementary Real Analysis
Elementary Real Analysis

University mathematics departments have for many years offered courses with titles such as Advanced Calculus or Introductory Real Analysis.The se courses are taken by a variety of students, serve a number of purposes, and are written at various levels of sophistication.T he students range from ones who have just completed a course in...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Electrical Engineering: Principles and Applications (5th Edition)
Electrical Engineering: Principles and Applications (5th Edition)

For undergraduate introductory or survey courses in electrical engineering.

 

ELECTRICAL ENGINEERING: PRINCIPLES AND APPLICATIONS, 5/e helps students learn electrical-engineering fundamentals with minimal frustration. Its goals are to...

PIC Microconrtoller and embedded systems
PIC Microconrtoller and embedded systems

Products using microprocessors generally fall into two categories. The first category uses high-performance microprocessors such as the Pentium in applications where system performance is critical. We have an entire book dedicated to this topic, The 80x86 IBM PC and Compatible Computers, Volumes / and //, from Prentice Hall, in the second...

Inkscape: Guide to a Vector Drawing Program (4th Edition) (SourceForge Community Press)
Inkscape: Guide to a Vector Drawing Program (4th Edition) (SourceForge Community Press)

This book serves as both a textbook and a reference for using Inkscape to produce high-quality drawings. It includes a series of tutorials followed by chapters that cover completely each facet of the Inkscape program. The book is full of tips and notes to enable the user to make the best use of the program.

Inkscape is an open...

The C Answer Book: Solutions to the Exercises in The C Programming Language, Second Edition
The C Answer Book: Solutions to the Exercises in The C Programming Language, Second Edition

Provides solutions to all exercises in Kernighan & Ritchie's new ANSI C book. Ideal for use with K&R in any course on C. Careful study of this answer book will help understand ANSI C and enhance programming skills. Tondo & Gimpel describe each solution and completely format programs to show the logical flow.

...
Result Page: 65 64 63 62 61 60 59 58 57 56 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy