Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Oracle SOA Suite 11g Administrator's Handbook
Oracle SOA Suite 11g Administrator's Handbook
Oracle SOA Suite 11g is the backbone of messaging and application integration in a service oriented architecture. An Application Administrator is responsible for end-to-end administration and management of this infrastructure. The role extends to other areas such as architecting an SOA infrastructure, troubleshooting, monitoring,...
Computational Line Geometry (Mathematics and Visualization)
Computational Line Geometry (Mathematics and Visualization)

The geometry of lines occurs naturally in such different areas as sculptured surface machining, computation of offsets and medial axes, surface reconstruction for reverse engineering, geometrical optics, kinematics and motion design, and modeling of developable surfaces. This book covers line geometry from various viewpoints and aims towards...

Fuzzing: Brute Force Vulnerability Discovery
Fuzzing: Brute Force Vulnerability Discovery
The concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered...
A Guide to MATLAB Object-Oriented Programming
A Guide to MATLAB Object-Oriented Programming
I am an admitted object-oriented fanatic. I have been designing and implementing object-oriented software for more than twenty years. When I started designing and implementing object-oriented MATLAB®, I encountered many detractors. They would say things like “The object model isn’t complete,” “You can’t have public...
Posters: A Global History
Posters: A Global History
From band posters stapled to telephone poles to the advertisements hanging at bus shelters to the inspirational prints that adorn office walls, posters surround us everywhere―but do we know how they began? Telling the story of this ephemeral art form, Elizabeth E. Guffey reexamines the poster’s roots in the nineteenth century and...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
A Manager's Guide To PR Projects: A Practical Approach (LEA's Communication Series)
A Manager's Guide To PR Projects: A Practical Approach (LEA's Communication Series)
A Manager s Guide to PR Projects was conceived, gestated, and produced
out of sheer frustration. Perhaps a more academic approach to this explanation
would be to say that one university professor experienced considerable
difficulty in acquiring appropriate materials to support a pedagogical approach
involving student
...
Fast Track Visual C++(r) 6.0 Programming
Fast Track Visual C++(r) 6.0 Programming
Get up to speed with the latest version of Visual C++. What makes Fast Track the C++ guide of choice is leading expert Steve Holzner's practical approach to learning by example. Cutting right to the core of issues crucial to programmers, this book begins with a brief refresher course and then moves quickly onto the skills that really count:...
Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Result Page: 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy