|
|
|
|
|
Network Protocols HandbookWe are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with... | | Designing Embedded Processors: A Low Power PerspectiveAs we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.
Increasingly, these systems have to consume little energy.... | | Alternate Data Storage ForensicsDigital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital... |
|
Credit and Community: Working-Class Debt in the UK since 1880Credit's centrality to the current economic crisis makes the publication of Sean O'Connell's social history of working-class credit consumption particularly timely. Although the credit crunch came too late to be included in this book, the portrait of a complex relationship between lenders and borrowers over the past 120 years should be required... | | | | Blender 3D Basics
When researching in preparation to write this book, we discovered that some Blender users
try to learn Blender three times and give up twice before they become comfortable with
Blender's effective, if unusual, interface. The editors at Packt and I decided that this was a
problem that could be solved. The answer is to explain... |
|
Use of Force: A Thriller (The Scot Harvath Series)
“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy
From #1 New York Times bestselling author Brad Thor.
As a storm rages across the Mediterranean Sea, a... | | iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure.
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to ... | | Scheduling AlgorithmsFrom the reviews of the fourth edition:
"This is a book about scheduling algorithms. … The book contains eleven chapters. … Most of the chapters contain the summarized complexity results. In this edition the complexity columns have been updated. The book is completed by the bibliography which also has been updated and... |
|
|
Result Page: 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 |