Principles of Model Checking Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a... Botnets: The Killer Web App This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world...
jQuery Cookbook (Animal Guide)
The New York City Subway System (Building America: Then and Now) In 1912, workers digging to create the Broadway Subway, north of Murray Street in lower Manhattan, hit a brick wall approximately 21 feet (6.4 meters) below the street surface. Breaking through the wall, the laborers came upon a tunnel 9 feet (2.7 m) in diameter and lined with eight- inch- thick (20.32 centimeters) bricks. Two rails led into a... The Fractal Structure of Data Reference: Applications to the Memory Hierarchy For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to... Essentials of Child Psychopathology (Essentials of Behavioral Science Series) The only concise, comprehensive overview of child psychopathology covering theory, assessment, and treatment as well as issues and trends
Essentials of Child Psychopathology provides students and professionals with a comprehensive overview of critical conceptual issues in child and adolescent psychopathology. The text covers the major theories,...
Spying Blind: The CIA, the FBI, and the Origins of 9/11
In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.
Zegart argues that after the Cold War...
Human-in-the-Loop Simulations: Methods and Practice
Both the editors of this book were exposed to human-in-the-loop simulations while
pursuing their doctoral degrees in the Center for Human-Machine Systems at
Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant
for the simulation course taught by Prof. Christine Mitchell. It has been over 15
A UML Pattern Language (Macmillan Technology Series)
This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called...
|Result Page: 684 683 682 681 680 679 678 677 676 675 674 673 672 |