 |
|
|
|
 Elements of ProgrammingElements of Programming provides a different understanding of programming than is presented elsewhere. Its major premise is that practical programming, like other areas of science and engineering,must be based on a solid mathematical foundation. The book shows that algorithms implemented in a real programming language,... |  |  Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... |  |  Data Mining with Microsoft SQL Server 2008The most authoritative book on data mining with SQL Server 2008
SQL Server Data Mining has become the most widely deployed data mining server in the industry. Business users—and even academic and scientific users—have adopted SQL Server data mining because of its scalability, availability, extensive functionality, and ease of... |
|
|
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 |