Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way

I cannot help but find striking resemblances between scientific communities and schools of fish. We interact in conferences and through articles, and we move together while a global trajectory emerges from individual contributions. Some of us like to be at the center of the school, others prefer to wander around, and a few swim in multiple...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

Beyond Programming: To a New Era of Design (Johns Hopkins University/Applied Physics Laboratory Series in Science and Engineering)
Beyond Programming: To a New Era of Design (Johns Hopkins University/Applied Physics Laboratory Series in Science and Engineering)
This book provides a unique examination of the software development process, arguing that discipline, still dominated by methods conceived in the framework of older technologies, must undergo a fundatmental reexamination of its guiding principles in order for significant progress to take place. To gain fresh insights into how we ought to direct...
GNOME 3 Application Development Beginner's Guide
GNOME 3 Application Development Beginner's Guide

Step-by-step practical guide to get to grips with GNOME application development

Overview

  • Full of easy to follow tutorials with ready-to-run code.
  • Covers most of the subsystems in the GNOME 3 platform stack, from low to high level.
  • Adapts common good development practices with...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
Autism Spectrum Disorders: Identification, Education, and Treatment
Autism Spectrum Disorders: Identification, Education, and Treatment
The field of autism has been growing at an unprecedented rate in recent years. In addition to an actual rise in the number of classic DSM-IV cases, broadened diagnostic criteria have uncovered a wider range of autistic behaviors and ability levels. The third edition of this well-known text continues the mission of its predecessors--to present a...
Yeast as a Tool in Cancer Research
Yeast as a Tool in Cancer Research

Leland H. Hartwell Director, Fred Hutchinson Cancer Research Center, Nobel Laureate for Medicine, 2001 Yeast has proved to be the most useful single-celled organism for studying the fundamental aspects of cell biology. Resources are now available for yeast that greatly simplify and empower new investigations, like the presence of strains with...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

The Mental Health Professional and the New Technologies: A Handbook for Practice Today
The Mental Health Professional and the New Technologies: A Handbook for Practice Today
Technology, used for both informational and telecommunication purposes, is becoming one of the most important factors in the future of health care delivery. One can see the oncoming change simply by surfing the Internet and looking at the proliferation of health-related Web sites. The 7 million Web sites uncovered by the Alta Vista search engine...
Result Page: 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy