Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Expert Spring MVC and Web Flow
Expert Spring MVC and Web Flow
Ican still remember the time I first realized what the Spring Framework was and how it could
help me. I was tasked with building a web application that will register new businesses with
the local government, and being a Java shop this meant the standard set of frameworks at the
time: Struts, JavaServer Pages (JSP), and Hibernate.
...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

How Do Hybrid Cars Work? (Science in the Real World)
How Do Hybrid Cars Work? (Science in the Real World)

In recent years, there has been much concern about the world's reliance on nonrenewable resources, such as oil. Scientists are attempting to decrease our dependency on oil - something cars require to work. Hybrid cars, which run on alternative energy sources like sunlight, corn, and biofuels, may be the key to using less oil. "How Do Hybrid...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Hardboiled Web Design
Hardboiled Web Design

Every web designer harbours tales of frustration, limitation and despair. Web design requires skills and knowledge beyond mere manipulation of form, shape, language, colour, message and meaning. What users don’t see behind those visuals is just as important as what they do see. We have to think about moving parts and engineering...

The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
According to a recent survey by the Travel Industry Association of America, nearly 80 million Americans turned to the Internet for help with travel planning in 2005. The same survey reports that the Internet is now used for some aspect of travel planning in more than 75 percent of all trips. You can count on these numbers rising in the years ahead....
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
"A phenomenal resource for both extreme and not-so-extreme researchers. Great tips, clear explanations, and years of expertise distilled into 250 pages of clear, engaging text. This book should be on every searcher's desk."  —Mary Ellen Bates, coauthor, Researching Online for Dummies

The
...
Implementing Service Quality in IP Networks
Implementing Service Quality in IP Networks

Why implement service quality? Is it possible to ensure reliable service quality in multi-service IP networks? Which technologies help in making end-to-end quality of service a realistic business proposition?

In Implementing Service Quality in IP Networks, Vilho Räisänen answers these questions and more. The author...

Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy