Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Topological Algorithms for Digital Image Processing (Machine Intelligence and Pattern Recognition)
Topological Algorithms for Digital Image Processing (Machine Intelligence and Pattern Recognition)
Objects in three dimensions, and their two-dimensional images, are approximated digitally by sets of voxels ("volume elements") or pixels ("picture elements"), respectively. Digital geometry is the study of geometric properties of digitized objects (or digitized images of objects); it deals both with the definitions of such...
C++ Interactive Course: Fast Mastery of C++
C++ Interactive Course: Fast Mastery of C++

Welcome to the exciting world of object-oriented programming! In this first chapter, I’ll start by discussing why object-oriented programming (OOP) was invented and why it offers advantages to the programmer. I’ll also provide a quick overview of the main...

Fermilab: Physics, the Frontier, and Megascience
Fermilab: Physics, the Frontier, and Megascience
Fermi National Accelerator Laboratory, located in the western suburbs of Chicago, has stood at the frontier of high-energy physics for nearly forty years. Since 1972, when the laboratory’s original particle accelerator began producing the world’s highest-energy protons for research, the government-supported scientific...
Pragmatic Guide to Git (Pragmatic Guides)
Pragmatic Guide to Git (Pragmatic Guides)

Get up to speed on Git right now with Pragmatic Guide to Git. Task-oriented two-page spreads get you up and running with minimal fuss. Each left-hand page dives into the underlying implementation for each task. The right-hand page contains commands that focus on the task at hand, and cross references to other tasks that are...

Biometrics and ID Management: COST 2101 European Workshop, BioID 2011
Biometrics and ID Management: COST 2101 European Workshop, BioID 2011

This volume of Springer Lecture Notes in Computer Sciences (LNCS) constitutes the final publication of the EU COST 2101 Action “Biometrics for Identity Documents and Smart Cards,” which has been successfully running during the years 2006-2010. One of the many valuable outputs of this initiative is the realization of a new...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Data Structures and Problem Solving Using Java (3rd Edition)
Data Structures and Problem Solving Using Java (3rd Edition)

T^his book is designed for a two-semester sequence in computer science, beginning with what is typically known as Data Structures and continuing with advanced data structures and algorithm analysis. It is appropriate for the courses from both the two-course and three-course sequences in "B.l...

Management (with InfoTrac 1-Semester Printed Access Card)
Management (with InfoTrac 1-Semester Printed Access Card)

MANAGEMENT, 4th edition by Chuck Williams presents management theory and applications in an engaging narrative style that students will find both enjoyable and illuminating. Williams focuses on the most important management theories and concepts, enhancing and illustrating them with detailed examples and stories that pull students into the...

tmux Taster
tmux Taster

tmux Taster is your short, concise volume to learn about tmux, the terminal multiplexer that allows you to multiplex several virtual consoles. With tmux you can access multiple separate terminal sessions inside a single terminal window or remote terminal session, and do so much more.

Through the seven to-the-point...

Tax Insight: For Tax Year 2013 and Beyond
Tax Insight: For Tax Year 2013 and Beyond

Tax Insight: For Tax Year 2013 and Beyond will teach you to take control of life’s biggest expense—taxes. In your lifetime, you will spend more money on taxes than on anything else. Despite that fact, you likely know the current prices of movies and milk but don’t know what your marginal tax rate is. You know where...

Genetic Toxicology and Cancer Risk Assessment
Genetic Toxicology and Cancer Risk Assessment

Presents state-of-the-art regulatory cancer risk assessment models including a biologically based model for two-hit carcinogenesis and cell proliferation!

This book comprehensively reviews the various roles of genetic toxicology in human cancer risk assessment conducted by United States and worldwide regulatory
...

unlimited object storage image
Result Page: 426 425 424 423 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy