Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business intelligence and data warehousing projects can be challenging and complex. Dealing with new technologies, processes, and different stakeholders presents an array of potential problems. To aid the project manager, there are recipes about project definition, scope, control, and risk management. Requirements, design, data analysis,...
Modular Compiler Verification: A Refinement-Algebraic Approach Advocating Stepwise Abstraction
Modular Compiler Verification: A Refinement-Algebraic Approach Advocating Stepwise Abstraction

After 40 years of practice and theory in compiler construction and 30 years of experience and teaching in software engineering we still observe that safetycritical high-level language programs are certified only together with the corresponding machine code. The reason is that certification institutions do not trust any compiler. And they are...

Eric Sink on the Business of Software
Eric Sink on the Business of Software
Even my founding of SourceGear was mostly unintentional. I quit my job at Spyglass and created a company that I never intended to grow. I merely wanted to work solo as a programmer doing projects on contract. Nine years later I find myself working in a real company with employees and a phone system. Everything that happened between then and now is...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

The Best Enemy Money Can Buy
The Best Enemy Money Can Buy
Back in 1973 this author published National Suicide: Military Aid to the Soviet Union, itself a sequel to a three volume academic study, Western Technology and Soviet Economic Development, published by the Hoover Institution, Stanford University. These four books are detailed verifiable catalogs of Western technology used and in use by the Soviet...
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Wave Goodbye to Type 2 Diabetes: 16 Holistic Lifestyle Practices to Prevent & Reverse Diabetes & Reclaim Joy, Vitality, & Plenty
Wave Goodbye to Type 2 Diabetes: 16 Holistic Lifestyle Practices to Prevent & Reverse Diabetes & Reclaim Joy, Vitality, & Plenty

Has diabetes or wild blood sugar swings taken you prisoner? Discover how to break free from being sick, tired, and symptomatic.

“Contrary to what conventional medicine generally believes, type 2 diabetes is reversible… even preventable. All the secrets for how to do this are right here in this engaging...

Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Microsoft ISA Server 2006 Unleashed
Microsoft ISA Server 2006 Unleashed
It is rare to run into that one product that impresses technical audiences in the way that ISA Server has managed to. As I prepared to write this book, what surprised me was not ISA’s ability to wow and charm Microsoft-centric environments, but its ability to impress the Microsoft-skeptic crowds as well. These are the ones who have been...
Professional XML Databases
Professional XML Databases
In this book, we look at how to integrate XML into your current relational data source strategies. With the increasing amount of data stored in relational databases, and the importance of XML as a format for marking up data - whether it be for storage, display, interchange, or processing - you need to have command of four key skills: understanding...
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Effective Software Maintenance and Evolution: A Reuse-Based Approach
Almost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy