Home | Amazing | Today | Tags | Publishers | Years | Search 
Wearable Robots: Biomechatronic Exoskeletons
Wearable Robots: Biomechatronic Exoskeletons
Being a multidisciplinary area involving subjects such as mechanics, electronics and computing, the evolution and spread of robotics to different application sectors still requires intense interaction with other fields of science and technology. This applies equally when dealing with wearable robots, meaning robotic systems that a...
Drinking Water and Infectious Disease: Establishing the Links
Drinking Water and Infectious Disease: Establishing the Links

There still exists considerable uncertainty in many countries about the contribution of drinking water to sporadic cases of disease. The Organization for Economic Cooperation and Development (OECD), in cooperation with the World Health Organization (WHO), led the Workshop on Molecular Technologies for Safe Drinking Water in 1998 to address...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

Java Performance
Java Performance
Today, Java is used at the heart of the world’s largest and most critical computing systems. However, when I joined the Java team in 1997 the platform was young and just gaining popularity. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional...
The CERT® Oracle® Secure Coding Standard for Java (SEI Series in Software Engineering)
The CERT® Oracle® Secure Coding Standard for Java (SEI Series in Software Engineering)

An essential element of secure coding in the Java programming language is a welldocumented and enforceable coding standard. The CERT Oracle Secure Coding Standard for Java provides rules for secure coding in the Java programming language. The goal of these rules is to eliminate insecure coding practices that can lead to exploitable...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
Whether you’re shopping for clothes from your computer or mobile phone, or selling artworks around the globe, you face a dizzying array of choices and decisions. How do I pay? How do I get paid? What if something goes wrong?

The answer? PayPal.

We are—and will continue to be—the
...
New Perspectives on Computer Concepts 2012: Introductory
New Perspectives on Computer Concepts 2012: Introductory
Synchronicity. It’s all about students and instructors tuning in to each other. And technology makes it possible. In a world of networks, e-mail, webinars, and social networking sites, technology can certainly strengthen the link between instructors and students.

New Perspectives on Computer Concepts 2012 is
...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Runescape Gold Strategy Guide
Runescape Gold Strategy Guide
Making money in RuneScape is challenging, but vitally important if you want to get the best equipment for your character. Whether you're interested in Player vs Player combat, high level dungeons, or just role-playing in cool clothes, you need money to achieve your goals.

RuneScape Gold Strategy Guide is the
...
Creating Web Pages Simplified
Creating Web Pages Simplified

The easiest way to learn how to create a Web page for your family or organization

Do you want to share photos and family lore with relatives far away? Have you been put in charge of communication for your neighborhood group or nonprofit organization? A Web page is the way to get the word out, and Creating Web Pages...

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy