Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Hilbert-Courant
Hilbert-Courant

If the life of any 20th century mathematician can be said to be a history of mathematics in his time, it is that of David Hilbert. To the enchanted young mathematicians and physicists who flocked to study with him in Goettingen before and between the World Wars, he seemed mathematics personified, the very air around him"scientifically...

Introduction to Survey Quality
Introduction to Survey Quality
The principles and concepts of survey measurement quality

Issues of survey quality have become increasingly more prominent in recent years. As more and more professionals who are not necessarily trained as survey researchers take on tasks associated with surveys, the need arises for a grounded, basic introduction to current survey methods and...

Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction

Environmental remote sensing is the measurement, from a distance, of the spectral features of the Earth’s surface and atmosphere. These measurements are normally made by instruments carried by satellites or aircraft, and are used to infer the nature and characteristics of the land or sea surface, or of the atmosphere, at the...

Logic Programming with Prolog
Logic Programming with Prolog
This book teaches the techniques of Logic Programming through the Prolog language. The name stands for Programming in Logic. Prolog has been used for a wide variety of applications, including as the basis for a standard ‘knowledge representation language’ for the Semantic Web – the next generation of internet technology; it is one...
Introduction to Forensic DNA Evidence for Criminal Justice Professionals
Introduction to Forensic DNA Evidence for Criminal Justice Professionals

The use of DNA profiling in forensic cases has been considered the most innovative technique in forensic science since fingerprinting, yet for those with limited scientific knowledge, understanding DNA enough to utilize it properly can be a daunting task. Introduction to Forensic DNA Evidence for Criminal Justice Professionals is...

Crystallization Process Systems
Crystallization Process Systems

Crystallization from solution is a core technology in major sectors of the chemical process and allied industries. Crystals are produced in varying sizes ranging from as small as a few tens of nanometers to several millimetres or more, both as discrete particles and as structured agglomerates. Well- established examples include bulk...

How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
Several times in my Enterprise Architecture (EA) practice, people asked me which framework shall I adopt or what are the benefits of the Zachman framework over TOGAF, etc. Others asked me to help them to define their own corporate EA framework. Before answering these types of questions, it is important to know what the differences and commonalities...
Beowulf Cluster Computing with Linux, Second Edition (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux, Second Edition (Scientific and Engineering Computation)
This how-to guide provides step-by-step instructions for building a Beowulf-type computer, including the physical elements that make up a clustered PC, the software required, and insights on how to organize the code to exploit parallelism.

Use of Beowulf clusters (collections of off-the-shelf commodity computers programmed to act in...

Analysis Patterns: Reusable Object Models (The Addison-Wesley Object Technology Series)
Analysis Patterns: Reusable Object Models (The Addison-Wesley Object Technology Series)

This innovative book recognizes the need within the object-oriented community for a book that goes beyond the tools and techniques of the typical methodology book. In Analysis Patterns: Reusable Object Models, Martin Fowler focuses on the end result of object-oriented analysis and design - the models themselves. He shares with...

Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)
Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)

This book is a part of ICL new book series “ICL Contribution to Landslide Disaster Risk Reduction” founded in 2019. Peer-reviewed papers submitted to the Fifth World Landslide Forum were published in six volumes of this book series. This book contains the followings:

• Five keynote lectures

...

Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy