Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Almost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are...
Advances In Quantitative Analysis Of Finance And Accounting
Advances In Quantitative Analysis Of Finance And Accounting
Advances in Quantitative Analysis of Finance and Accounting is an annual publication designed to disseminate developments in the quantitative analysis of finance and accounting. The publication is a forum for statistical and quantitative analyses of issues in finance and accounting, as well as applications of quantitative methods to problems in...
Personality Disorders (Diseases and Disorders)
Personality Disorders (Diseases and Disorders)
Charles Best, one of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the gratification of knowing one is helping people,” he confided, “although that probably is a more heroic and selfless motivation. Those feelings may enter in, but...
Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

Hacking Digital Cameras (ExtremeTech)
Hacking Digital Cameras (ExtremeTech)
Why waste a thousand words?

Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...

iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more

Everyone seems to have an opinion as to why their favorite mobile platform is better than the others. Some prefer iOS, others choose Android—each platform has its pros and cons. For me, however, iOS stands above the rest in large part due to its use of powerful native frameworks.

Sure, frameworks and...

The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

DNS and BIND on IPv6
DNS and BIND on IPv6

I’m sorry for writing this ebook.

Well, that’s not quite accurate. What I mean is, I’m sorry I didn’t have time to update DNS and BIND to include all this new IPv6 material. DNS and BIND deserves a sixth edition, but I’m afraid my schedule is so hectic right now that I just don’t have time to...

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

A Dictionary of Real Numbers
A Dictionary of Real Numbers
How do we recognize that the number .93371663... is actually 21og1 0(e + 7r)/2 ? Gauss observed that the number 1.85407467... is (essentially) a rational value of an elliptic integral—an observation that was critical in the development of nineteenth century analysis. How do we decide that such a number is actually a special value of a...
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
"Ming Design II is a welcome update of its predecessor, itself a useful compendium on the philosophy of cognitive science. This new volume retains the intellectual foundations, and some discussions of classical AI built on them, while adding connectionism, situated AI, and dynamic systems theory as extra storeys. Which of these is...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy