|
|
|
|
|
|
Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... | | Blind Image Deconvolution: Theory and ApplicationsBlind image deconvolution is constantly receiving increasing attention from the academic as well the industrial world due to both its theoretical and practical implications. The field of blind image deconvolution has several applications in different areas such as image restoration, microscopy, medical imaging, biological imaging, remote sensing,... | | Electrician's Troubleshooting and Testing Pocket Guide, Third EditionThe ultimate electrical equipment troubleshooting pocket guide
Designed for quick reference at any job site, the Electrician's Troubleshooting and Testing Pocket Guide enables electricians using portable meters to test, maintain, and troubleshoot all types of electrical equipment and systems.
This updated... |
|
|
|
Result Page: 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 |