Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Going Stealth: Transgender Politics and U.S. Surveillance Practices
Going Stealth: Transgender Politics and U.S. Surveillance Practices
In Going Stealth Toby Beauchamp demonstrates how the enforcement of gender conformity is linked to state surveillance practices that identify threats based on racial, gender, national, and ableist categories of difference. Positioning surveillance as central to our understanding of transgender politics, Beauchamp examines a...
Professional Pen Testing for Web Applications (Programmer to Programmer)
Professional Pen Testing for Web Applications (Programmer to Programmer)
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical...
Surgical Oncology (Vademecum)
Surgical Oncology (Vademecum)
An admirable addition...texts that provide students with a manageable and very understandable reference to the topics of surgical oncology. -- Peter R. Jochimsen, MD(University of Iowa Hospitals and Clinics)Doody Book Review Service

This book presents the most important information in surgical oncology in an easily
...
Intelligent Wearable Interfaces
Intelligent Wearable Interfaces
This book introduces methodologies to develop a variety of intelligent wearable interfaces and covers practical implementations of systems for real-life applications. A number of novel intelligent wearable interface systems are examined, including network architecture for wearable robots, wearable interface for automatic language translation,...
Home Networking Demystified
Home Networking Demystified
No need to be intimidated by home networking! With a very readable and easy to understand writing style, this book takes the anxiety out of learning how to build or expand a home network. Read a home networking book organised like a fun and painless self-teaching guide. Use the 8-page, 2-colour visual instruction insert to see how to set up a home...
Making Embedded Systems: Design Patterns for Great Software
Making Embedded Systems: Design Patterns for Great Software
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build...
International Classification of HRCT for Occupational and Environmental Respiratory Diseases
International Classification of HRCT for Occupational and Environmental Respiratory Diseases

Many international experts collaborated in creating this groundbreaking work, a principal-coding system, and in developing reference films and imaging parameters for the International Classification of HRCT for Occupational and Environmental Respiratory Diseases. The book is an authoritative guide to the recognition of dust...

Cooperating Embedded Systems and Wireless Sensor Networks
Cooperating Embedded Systems and Wireless Sensor Networks

A number of different system concepts have become apparent in the broader context of embedded systems over the past few years. Whilst there are some differences between these, this book argues that in fact there is much they share in common, particularly the important notions of control, heterogenity, wireless communication, dynamics/ad hoc...

Using Yocto Project with BeagleBone Black
Using Yocto Project with BeagleBone Black

Unleash the power of the BeagleBone Black embedded platform with Yocto Project

About This Book

  • Build real world embedded system projects using the impressive combination of Yocto Project and Beaglebone Black
  • Learn how to effectively add multimedia to your board and save time by exploiting...
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
This book explores the interconnected ways in which the control of knowledge has become central to the exercise of political, economic, and social power. Building on the work of International Political Economy scholar Susan Strange, this multidisciplinary volume features experts from political science, anthropology, law, criminology,...
Ruling the Root: Internet Governance and the Taming of Cyberspace
Ruling the Root: Internet Governance and the Taming of Cyberspace

In Ruling the Root, Milton Mueller uses the theoretical framework of institutional economics to analyze the global policy and governance problems created by the assignment of Internet domain names and addresses. “The root” is the top of the domain name hierarchy and the Internet address space. It is the only point of...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy