Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
Beginning Drupal (Wrox Programmer to Programmer)
Beginning Drupal (Wrox Programmer to Programmer)

A thorough introduction that lessens the learning curve to building sites with Drupal 7

Drupal 7 is the latest version of the free, open source content management system Drupal. A powerful content management system and framework Drupal has an unfortunate reputation of having a steep learning curve. This guide to Drupal 7...

SAS Functions by Example, Second Edition
SAS Functions by Example, Second Edition

Fully updated for SAS 9.2, Ron Cody's SAS Functions by Example, Second Edition, is a must-have reference for anyone who programs in Base SAS. With the addition of functions new to SAS 9.2, this comprehensive reference manual now includes more than 200 functions, including new character, date and time, distance, probability, sort, and...

CSS Cookbook, 3rd Edition (Animal Guide)
CSS Cookbook, 3rd Edition (Animal Guide)

What people are saying about CSS Cookbook

"Christopher's fantastic cookbook will give you solutions to pretty much all of the CSS problems you'll come up against in your day-to-day web design work, saving you bags of time and frustration. This guy is one of the industry's brightest minds --...

Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy
Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy

Host Your Web Site On The Cloud is the OFFICIAL step-by-step guide to this revolutionary approach to hosting and managing your websites and applications, authored by Amazon's very own Jeffrey Barr.

"Host Your Web Site in the Cloud" shows you just how easy it is to host your website in the cloud with...

High Dynamic Range Imaging, Second Edition: Acquisition, Display, and Image-Based Lighting
High Dynamic Range Imaging, Second Edition: Acquisition, Display, and Image-Based Lighting

This landmark book is the first to describe HDRI technology in its entirety and covers a wide-range of topics, from capture devices to tone reproduction and image-based lighting. The techniques described enable you to produce images that have a dynamic range much closer to that found in the real world, leading to an unparalleled visual...

Play Redux: The Form of Computer Games (Digital Culture Books)
Play Redux: The Form of Computer Games (Digital Culture Books)
A new look at digital gaming and the aesthetics of play
 
Play is a very interesting thing. Somewhat strangely, though, play is not studied as often as are the consequences of play.
 
The reason for this becomes clear when we try to study play: it is a...
Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Data Mining with R: Learning with Case Studies
Data Mining with R: Learning with Case Studies

The versatile capabilities and large set of add-on packages make R an excellent alternative to many existing and often expensive data mining tools. Exploring this area from the perspective of a practitioner, Data Mining with R: Learning with Case Studies uses practical examples to illustrate the power of R and data...

Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)

Change: It’s what we expect from technology, from the PC to the web, through to HD TV. But nothing has been as disruptive as the change the iPhone and Android phones have brought. For the first time the power of a computer will fit in your hand, you are always connected to the Internet, and these devices are loaded with...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

unlimited object storage image
Result Page: 1271 1270 1269 1268 1267 1266 1265 1264 1263 1262 1261 1260 1259 1258 1257 1256 1255 1254 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy