Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

How Do Hybrid Cars Work? (Science in the Real World)
How Do Hybrid Cars Work? (Science in the Real World)

In recent years, there has been much concern about the world's reliance on nonrenewable resources, such as oil. Scientists are attempting to decrease our dependency on oil - something cars require to work. Hybrid cars, which run on alternative energy sources like sunlight, corn, and biofuels, may be the key to using less oil. "How Do Hybrid...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Hardboiled Web Design
Hardboiled Web Design

Every web designer harbours tales of frustration, limitation and despair. Web design requires skills and knowledge beyond mere manipulation of form, shape, language, colour, message and meaning. What users don’t see behind those visuals is just as important as what they do see. We have to think about moving parts and engineering...

The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
According to a recent survey by the Travel Industry Association of America, nearly 80 million Americans turned to the Internet for help with travel planning in 2005. The same survey reports that the Internet is now used for some aspect of travel planning in more than 75 percent of all trips. You can count on these numbers rising in the years ahead....
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
"A phenomenal resource for both extreme and not-so-extreme researchers. Great tips, clear explanations, and years of expertise distilled into 250 pages of clear, engaging text. This book should be on every searcher's desk."  —Mary Ellen Bates, coauthor, Researching Online for Dummies

The
...
Implementing Service Quality in IP Networks
Implementing Service Quality in IP Networks

Why implement service quality? Is it possible to ensure reliable service quality in multi-service IP networks? Which technologies help in making end-to-end quality of service a realistic business proposition?

In Implementing Service Quality in IP Networks, Vilho Räisänen answers these questions and more. The author...

Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms
Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms

Storage technologies have fundamentally changed the landscape of digital media in a profound way. Gone are the days of using a single hard disk drive on a workstation as the sole means to store digital content. Nearly vanished is the practice of capturing video and audio only on videotape. The practice of transferring videotape...

unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy