Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Optimization and Security Challenges in Smart Power Grids (Energy Systems)
Optimization and Security Challenges in Smart Power Grids (Energy Systems)

This book provides an overview of state-of-the-art research on “Systems and Optimization Aspects of Smart Grid Challenges.” The authors have compiled and integrated different aspects of applied systems optimization research to smart grids, and also describe some of its critical challenges and requirements.

The promise...

Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Visual Basic® .NET Power Coding
Visual Basic® .NET Power Coding

Visual Basic(R) .NET Power Coding is the experienced developer's guide to mastering advanced Visual Basic .NET concepts. Paul Kimmel saves readers time and money by providing thorough explanations of essential topics so you can quickly begin creating robust programs that have fewer bugs. He...

Information Technology: Selected Tutorials (IFIP International Federation for Information Processing)
Information Technology: Selected Tutorials (IFIP International Federation for Information Processing)
This book contains a selection of tutorials on hot topics in information
technology, which were presented at the IFIP 18th World Computer
Congress. WCC2004 took place at the Centre de Congrès Pierre Baudis, in
Toulouse, France, from 22 to 27 August 2004.

The 11 chapters included in the book were chosen from
...
Streaming Media: Building and Implementing a Complete Streaming System
Streaming Media: Building and Implementing a Complete Streaming System
A complete toolkit to successfully develop and implement streaming media on the Web

From hands-on training and distance learning to teleconferencing and product demonstrations, streaming media is providing businesses with a whole new world of opportunity. Written by one of the leading experts in the field, this book will provide you with all...

Sensors Applications, Volume 2
Sensors Applications, Volume 2
Taken as a whole, this series covers all major fields of application for commercial sensors, as well as their manufacturing techniques and major types. As such the series does not treat bulk sensors, but rather places strong emphasis on microsensors, microsystems and integrated electronic sensor packages. Each of the individual volumes is tailored...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions....
Windows Vista®: Home Networking (Epg - Other)
Windows Vista®: Home Networking (Epg - Other)
With more than one Windows Vistabased PC in your home, and all of your digital memories, music and media, and other data stored on one computer, you know that its time to connect your home with a simple home network. Youll get the straightforward, approachable information you need (without the jargon!) to find what kind of network is right for you...
Java Web Services: Up and Running
Java Web Services: Up and Running
This example-driven book offers a thorough introduction to Java's APIs for XML Web Services (JAX-WS) and RESTful Web Services (JAX-RS). Java Web Services: Up and Running takes a clear, pragmatic approach to these technologies by providing a mix of architectural overview, complete working code examples, and short yet precise instructions for...
unlimited object storage image
Result Page: 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy