Home | Amazing | Today | Tags | Publishers | Years | Search 
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010

Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination...

Moodle JavaScript Cookbook
Moodle JavaScript Cookbook

Moodle is the best e-learning solution on the block and is revolutionizing courses on the Web. Using JavaScript in Moodle is very useful for administrators and dynamic developers, as it uses built-in libraries to provide the modern and dynamic experience that is expected by web users today.

The Moodle JavaScript Cookbook will take...

Machine Learning and Knowledge Discovery in Databases: European Conference
Machine Learning and Knowledge Discovery in Databases: European Conference

When in 1986 Yves Kodratoff started the European Working Session on Learning at Orsay, France, it could not be foreseen that the conference would grow year by year and become the premier European conference of the field, attracting submissions from all over the world. The first European Conference on Principles of Data Mining and Knowledge...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!
Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!

Microsoft Visio 2010 is a bold new release. If you’re new to Visio, your timing is excellent! This version of Visio is easier to use than ever before and yet the diagrams you create can have more impact and style, and can present more real-world data than in any previous version.

If you’ve used prior versions...

LaTeX Beginner's Guide
LaTeX Beginner's Guide

LaTeX is a high-quality open source typesetting software that produces professional prints and PDF files. However, as LaTeX is a powerful and complex tool, getting started can be intimidating. There is no official support and certain aspects such as layout modifications can seem rather complicated. It may seem more straightforward to use Word...

Essential Software Architecture
Essential Software Architecture

Job titles like “Technical Architect” and “Chief Architect” nowadays abound in software industry, yet many people suspect that “architecture” is one of the most overused and least understood terms in professional software development.

Gorton’s book tries to resolve this dilemma. It...

Dependency Structures and Lexicalized Grammars: An Algebraic Approach
Dependency Structures and Lexicalized Grammars: An Algebraic Approach

This book reports the major results of roughly four years of doctoral research. Among the many people who have contributed to it, there are some to whom I owe a particularly large debt of gratitude.

Since 2002, FoLLI has awarded an annual prize for outstanding dissertations in the fields of Logic, Language and Information. This...

Transparent Oxide Electronics: From Materials to Devices
Transparent Oxide Electronics: From Materials to Devices

Transparent electronics is emerging as one of the most promising technologies for the next generation of electronic products, away from the traditional silicon technology. It is essential for touch display panels, solar cells, LEDs and antistatic coatings.

The book describes the concept of transparent electronics, passive and...

The Definitive Guide to MongoDB: The NoSQL Database for Cloud and Desktop Computing
The Definitive Guide to MongoDB: The NoSQL Database for Cloud and Desktop Computing

MongoDB, a cross-platform NoSQL database, is the fastest-growing new database in the world. MongoDB provides a rich document-oriented structure with dynamic queries that you’ll recognize from RDBMS offerings such as MySQL. In other words, this is a book about a NoSQL database that does not require the SQL crowd to re-learn how the...

Result Page: 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy