Home | Amazing | Today | Tags | Publishers | Years | Search 
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year....
Challenges in Granular Physics
Challenges in Granular Physics
While the study of granular materials has an old and distinguished history, this history has only recently included large numbers of physicists. What explains the upsurge in the interest in the physics of granular materials over the past 15 years? While this is perhaps a question best left to historians or sociologists of science,...
Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, UK, 3 - 5 February 2009
Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, UK, 3 - 5 February 2009
The Safety-critical Systems Symposium (SSS), held each February for seventeen consecutive years, offers a full-day tutorial followed by two days of presentations of papers. This book of Proceedings contains all the papers presented at SSS’09.

The first paper accompanies the tutorial, which addresses one of the
...
Oracle Business Intelligence Enterprise Edition 11g: A Hands-On Tutorial
Oracle Business Intelligence Enterprise Edition 11g: A Hands-On Tutorial
Oracle Business Intelligence Enterprise Edition (OBIEE) 11g is packed full of features and has a fresh approach to information presentation, system management and security. This book will introduce the reader to those features, providing a step-by-step guide to building a complete system from scratch. The aim of the book is to...
Microsoft System Center 2012 Unleashed
Microsoft System Center 2012 Unleashed

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and...

jQuery Mobile: Develop and Design
jQuery Mobile: Develop and Design

Smartphone, tablet, and e-reader statistics are showing an unprecedented adoption rate, making the mobile web a very hot topic and requiring a new set of skills from web developers and designers. Mobile device usage is skyrocketing; according to Nielsen’s third-quarter 2011 Mobile Media Report, “44 percent of...

Beginning Database Design: From Novice to Professional (Beginning Apress)
Beginning Database Design: From Novice to Professional (Beginning Apress)
Everyone keeps data. Big organizations spend millions to look after their payroll, customer, and transaction data. The penalties for getting it wrong are severe: businesses may collapse, shareholders and customers lose money, and for many organizations (airlines, health boards, energy companies), it is not exaggerating to say that...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Programming with the Kinect for Windows Software Development Kit: Add gesture and posture recognition to your applications
Programming with the Kinect for Windows Software Development Kit: Add gesture and posture recognition to your applications
I am always impressed when science fiction and reality meet. With Kinect for Windows, this is definitely the case, and it is exciting to be able to control the computer with only our hands, without touching any devices, just like in the movie “Minority Report.”

I fell in love with Kinect for Windows
...
FusionCharts Beginner’s Guide: The Official Guide for FusionCharts Suite
FusionCharts Beginner’s Guide: The Official Guide for FusionCharts Suite
As web developers, we build applications that feed on data. We parse it, process it, and report it. Our reports take the form of tables, grids, and diagrams such as charts, gauges, and maps. Parsing and processing are backend tasks that are invisible to the user. The actual reporting of data, however, is a bulk of an experience a...
An Introduction to Linear Programming and Game Theory
An Introduction to Linear Programming and Game Theory

Praise for the Second Edition:

"This is quite a well-done book: very tightly organized, better-than-average exposition, and numerous examples, illustrations, and applications."
—Mathematical Reviews of the American Mathematical Society

An Introduction to Linear Programming and...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy