Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
The Second Self: Computers and the Human Spirit -- Twentieth Anniversary Edition
The Second Self: Computers and the Human Spirit -- Twentieth Anniversary Edition
In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she...
Kantian Reason and Hegelian Spirit: The Idealistic Logic of Modern Theology
Kantian Reason and Hegelian Spirit: The Idealistic Logic of Modern Theology

Winner: 2012 The American Publishers Award for Professional and Scholarly Excellence in Theology and Religious Studies, PROSE Award.

In this thought-provoking new work, the world renowned theologian Gary Dorrien reveals how Kantian and post-Kantian idealism were instrumental in the foundation and development of modern
...

Common Statistical Methods for Clinical Research with SAS Examples, Third Edition
Common Statistical Methods for Clinical Research with SAS Examples, Third Edition

Aristotle, one of mankind’s greatest thinkers, rooted his basis of human understanding in the notion that universal phenomena can be explained through perception and rationalization. As such, Aristotle conjectured that a 10-pound object should fall through the air 10 times faster than a similar 1-pound object. This, and other intuitive...

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Playing with Infinity: Mathematical Explorations and Excursions
Playing with Infinity: Mathematical Explorations and Excursions
Popular account ranges from counting to mathematical logic and covers the many mathematical concepts that relate to infinity: graphic representation of functions; pairings and other combinations; prime numbers; logarithms and circular functions; formulas, analytical geometry; infinite lines, complex numbers, expansion in the power series;...
A Mathematical Introduction to Fluid Mechanics (Texts in Applied Mathematics) (v. 4)
A Mathematical Introduction to Fluid Mechanics (Texts in Applied Mathematics) (v. 4)

The goal of this text is to present some of the basic ideas of fluid mechanics in a mathematically attractive manner, to present the physical background and motivation for some constructions that have been used in recent mathematical and numerical work on the Navier-Stokes equations and on hyperbolic systems and to interest some of the...

Software Engineering: Theory and Practice (4th Edition)
Software Engineering: Theory and Practice (4th Edition)
Software engineering has come a long way since 1У6Х. when the term was first used at a NATO conference. And software itself has entered our lives in ways that few had anti cipated, even a decade ago. So a firm grounding in software engineering theory and practice is essential for understanding how to build good software and...
Relativistic Reality: A Modern View (Knots and Everything, Vol 12)
Relativistic Reality: A Modern View (Knots and Everything, Vol 12)
This book has its origins in my leaving applied physics in 1969 to teach at a small college and ponder the foundations of physics without pressure, even if with limited time caused by a heavy teaching load. Richard Feynman had lectured weekly during the two years I spent at Hughes Labs in Malibu, after graduating from Engineering Physics at...
Resource Allocation in Project Management
Resource Allocation in Project Management
The book is devoted to structural issues, algorithms, and applications of resource allocation problems in project management. Special emphasis is given to a unifying framework within which a large variety of project scheduling problems can be treated. Those problems involve general temporal constraints among project activities, different types of...
The Easy Guide to Repertory Grids
The Easy Guide to Repertory Grids
This book is the result of some experiences I’ve had during the last 10 years, teaching repertory grid technique to a variety of audiences. There have been two main kinds of trainee. The first has comprised my direct students at Luton Graduate Business School, managers studying for MBA and MSc degrees on a part-time basis, and young graduates...
FORTRAN 90 for Scientists and Engineers
FORTRAN 90 for Scientists and Engineers
The Fortran 90 standard represents the first significant change in Fortran in over 20 years,
and brings it into line with most modern structured programming languages. This book is
one of a handful on Fortran 90, and one of even fewer in which every program (unless
otherwise clearly stated) has been tested on a working compiler: the
...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy