Home | Amazing | Today | Tags | Publishers | Years | Search 
Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

C# 2010 All-in-One For Dummies
C# 2010 All-in-One For Dummies

A logical, straightforward approach to learning the C# language

C# is a complicated programming language for building .NET-connected software for Microsoft Windows, the Web, and a wide range of devices. The friendly All-in-One For Dummies format is a perfect way to present it. Each minibook is a self-contained package...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

REST in Practice: Hypermedia and Systems Architecture
REST in Practice: Hypermedia and Systems Architecture

Why don't typical enterprise projects go as smoothly as projects you develop for the Web? Does the REST architectural style really present a viable alternative for building distributed systems and enterprise-class applications?

In this insightful book, three SOA experts provide a down-to-earth explanation of REST and...

Modeling and Tools for Network Simulation
Modeling and Tools for Network Simulation

A crucial step during the design and engineering of communication systems is the estimation of their performance and behavior; especially for mathematically complex or highly dynamic systems network simulation is particularly useful. This book focuses on tools, modeling principles and state-of-the art models for discrete-event based network...

Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems (Embedded Systems)
Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems (Embedded Systems)

For real-time systems, the worst-case execution time (WCET) is the key objective to be considered. Traditionally, code for real-time systems is generated without taking this objective into account and the WCET is computed only after code generation. Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems presents...

Becoming a Tiger: How Baby Animals Learn to Live in the Wild
Becoming a Tiger: How Baby Animals Learn to Live in the Wild

It's a jungle out there. And survival is never a given. Somehow, a blind, defenseless tiger kitten must evolve into a deadly, efficient predator; a chimp must learn to distinguish edible plants from lethal poisons; a baby buffalo must be able to pick its mother out of a herd of hundreds. Contrary to common belief, not everything is...

Standard for VHDL Register Transfer Level (Rtl) Synthesis
Standard for VHDL Register Transfer Level (Rtl) Synthesis

[This introduction is not part of IEEE Std 1076.6-1999, IEEE Standard for VHDL Register Transfer Level (RTL) Synthesis.]

This standard describes a syntax and semantics for VHDL RTL synthesis. It defines the subset of IEEE Std 1076-1993 (VHDL) that is suitable for RTL synthesis as well as the semantics of that subset for the...

Multidimensional Databases and Data Warehousing (Synthesis Lectures on Data Management)
Multidimensional Databases and Data Warehousing (Synthesis Lectures on Data Management)

The present book's subject is multidimensional data models and data modeling concepts as they are applied in real data warehouses. The book aims to present the most important concepts within this subject in a precise and understandable manner. The book's coverage of fundamental concepts includes data cubes and their elements, such as...

Teledermatology: A User's Guide (New Approaches to European His)
Teledermatology: A User's Guide (New Approaches to European His)

Teledermatology: A User's Guide was written to provide practical information for those individuals contemplating or planning a teledermatology program or expanding their current use of teledermatology. It focuses on the practical aspects of teledermatology implementation while providing a comprehensive treatment of the topic. Discussions...

Digital Video Surveillance and Security
Digital Video Surveillance and Security

Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security system clients need, allowing security professionals to protect their client's place of business or home. The author gives detailed plans on the best camera position, areas of coverage, hardware and software to select in order to maximize...

Internet Crimes, Torts and Scams: Investigation and Remedies
Internet Crimes, Torts and Scams: Investigation and Remedies

Internet Crimes, Torts and Scams: Investigation and Remedies helps attorneys understand the increasing range of illegal and malicious internet activity and a similarly expanding number of response or enforcement options. Reflecting a "real-world" dynamic, the book is problem-oriented and cuts across many practice areas including...

Result Page: 898 897 896 895 894 893 892 891 890 889 888 887 886 885 884 883 882 881 880 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy