Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Electromagnetic Simulation Using the FDTD Method
Electromagnetic Simulation Using the FDTD Method

A straightforward, easy-to-read introduction to the finite-difference time-domain (FDTD) method

Finite-difference time-domain (FDTD) is one of the primary computational electrodynamics modeling techniques available. Since it is a time-domain method, FDTD solutions can cover a wide frequency range with a single simulation run...

Programming in Lua, Second Edition
Programming in Lua, Second Edition

Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. "Programming in Lua" is...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Java Game Development with LibGDX: From Beginner to Professional
Java Game Development with LibGDX: From Beginner to Professional
Learn to design and create video games using the Java programming language and the LibGDX software library. Working through the examples in this book, you will create 12 game prototypes in a variety of popular genres, from collection-based and shoot-em-up arcade games to side-scrolling platformers and sword-fighting adventure games....
Macromedia Flash 8 for Windows and Macintosh : Visual QuickStart Guide
Macromedia Flash 8 for Windows and Macintosh : Visual QuickStart Guide

An improved script editor (with a visual interface), a revamped library interface, a new Undo feature, powerful run-time effects, breakthrough motion-graphics capabilitiesthese are just a few of the reasons Web designers are raving about the newest version of their favorite Web tool, Macromedia Flash 8. Whether you're a...

Six Sigma and Beyond: Statistical Process Control, Volume IV
Six Sigma and Beyond: Statistical Process Control, Volume IV
This guide introduces the statistical process control (SPC) methodology for collecting data, arranging data in a chart or graph form, and interpreting the data to reduce variations in the process.

Features

  • Provides an overview of SPC in very simple, easily understood terms
  • Reviews and explains traditional...
Image Processing Using Pulse-Coupled Neural Networks
Image Processing Using Pulse-Coupled Neural Networks
Humans have an outstanding ability to recognise, classify and discriminate
objects with extreme ease. For example, if a person was in a large classroom
and was asked to find the light switch it would not take more than a second or
two. Even if the light switch was located in a different place than the human
expected or it was
...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing presents one of the first comprehensive guides to testing activities, ranging from test planning through test completion for every phase of software under development, and software under revision. Real life case studies are provided to enhance understanding as well as a companion website with tools and examples....
Pro (IBM) WebSphere Application Server 7 Internals
Pro (IBM) WebSphere Application Server 7 Internals
Pro (IBM) WebSphere Application Server 7 Internals covers the internal architecture and implementation of the WebSphere Application Server (WAS) version 7 product set and how other IBM products extend it. It presents information to enable administrators, developers, and architects to learn about the aspects of WAS that apply to them:
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Understanding Complex Datasets: Data Mining with Matrix Decompositions
Many data-mining algorithms were developed for the world of business, for example for customer relationship management. The datasets in this environment, although large, are simple in the sense that a customer either did or did not buy three widgets, or did or did not fly from Chicago to Albuquerque.

In contrast,
...
unlimited object storage image
Result Page: 324 323 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy