Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Critical Information Infrastructures: Resilience and Protection
Critical Information Infrastructures: Resilience and Protection
A very interesting and informative book that covers a wide but interlinked set of subjects. Indeed, attention has been paid to assisting the reader to understand complex and current issues, and it can be said that the work is extremely well researched, up-to-date and of interest to a wide audience including practising managers, government...
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Hyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and...
The Definitive Guide to the ARM Cortex-M3
The Definitive Guide to the ARM Cortex-M3
This user's guide does far more than simply outline the ARM Cortex-M3 CPU features; it explains step-by-step how to program and implement the processor in real-world designs. It teaches readers how to utilize the complete and thumb instruction sets in order to obtain the best functionality, efficiency, and reuseability. The author, an ARM engineer...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
x86 Instruction Set Architecture
x86 Instruction Set Architecture

The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in...

Sas 9.1 Language Reference Concepts
Sas 9.1 Language Reference Concepts
This title comprehensively documents essential concepts for SAS features, the DATA step, and SAS files, including general BASE SAS concepts, BASE SAS DATA, BASE SAS file concepts, and much more.

Base SAS software enables you to bring all your data into a single system. This title comprehensively documents essential concepts for SAS
...
Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Data Protection in a Profiled World
Data Protection in a Profiled World

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data...

Marine Biofouling: Colonization Processes and Defenses
Marine Biofouling: Colonization Processes and Defenses

Recent instances of bioinvasion, such as the emergence of the zebra mussel in the American Great Lakes, generated a demand among marine biologists and ecologists for groundbreaking new references that detail how organisms colonize hard substrates, and how to prevent damaging biomass concentrations.

Marine Biofouling:
...

Intellectual Property Protection in VLSI Design: Theory and Practice
Intellectual Property Protection in VLSI Design: Theory and Practice
The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years....
Vision-based Pedestrian Protection Systems for Intelligent Vehicles (SpringerBriefs in Computer Science)
Vision-based Pedestrian Protection Systems for Intelligent Vehicles (SpringerBriefs in Computer Science)

Pedestrian Protection Systems (PPSs) are on-board systems aimed at detecting and tracking people in the surroundings of a vehicle in order to avoid potentially dangerous situations. These systems, together with other Advanced Driver Assistance Systems (ADAS) such as lane departure warning or adaptive cruise control, are one of the most...

Profiting from Innovation in China
Profiting from Innovation in China

China is dramatically catching up and is rapidly becoming a leading technological innovator on the global scale. The number of Chinese firms with global ambitions is growing fast, more and more technological innovation is coming from China, and the number of patents in China is also growing steadily. The negative side of this development is...

Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy