Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning MapServer: Open Source GIS Development (Expert's Voice in Open Source)
Beginning MapServer: Open Source GIS Development (Expert's Voice in Open Source)
Maps have played a prominent role in human activity for thousands of years. One of the earliest known maps was uncovered during the course of an archaeological excavation in Turkey in 1961. The Çatalhöyük site is a neolithic settlement dating from approximately 6500 BC. The map consists of a partially preserved, painted plaster...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Neo4j in Action
Neo4j in Action

Summary

Neo4j in Action is a comprehensive guide to Neo4j, aimed at application developers and software architects. Using hands-on examples, you'll learn to model graph domains naturally with Neo4j graph structures. The book explores the full power of native Java APIs for graph data manipulation and...

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Beyond Programming: To a New Era of Design (Johns Hopkins University/Applied Physics Laboratory Series in Science and Engineering)
Beyond Programming: To a New Era of Design (Johns Hopkins University/Applied Physics Laboratory Series in Science and Engineering)
This book provides a unique examination of the software development process, arguing that discipline, still dominated by methods conceived in the framework of older technologies, must undergo a fundatmental reexamination of its guiding principles in order for significant progress to take place. To gain fresh insights into how we ought to direct...
Formal Software Development
Formal Software Development
This book is intended for final-year undergraduate and postgraduate computing students specializing in the field of software engineering. The text concentrates on the challenges that high integrity software development poses, and how formal methods can help meet these challenges.

Formal methods have long been advocated for the
...
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Those not already deeply immersed in recondite Kennedy assassination lore will find this offering by Kroth-an associate professor of counseling psychology at Santa Clara University, and a contributor to CounterPunch, a biweekly "muckraking newsletter"-well over the top. Advertised as an "objective" look at the myriad conspiracy...
GNOME 3 Application Development Beginner's Guide
GNOME 3 Application Development Beginner's Guide

Step-by-step practical guide to get to grips with GNOME application development

Overview

  • Full of easy to follow tutorials with ready-to-run code.
  • Covers most of the subsystems in the GNOME 3 platform stack, from low to high level.
  • Adapts common good development practices with...
Hidden Unity in Nature's Laws
Hidden Unity in Nature's Laws
One of the paradoxes of the physical sciences is that as our knowledge has progressed, more and more diverse physical phenomena can be explained in terms of fewer underlying laws, or principles. In Hidden Unity, eminent physicist John Taylor puts many of these findings into historical perspective and documents how progress is made when unexpected,...
The IOMA Handbook of Logistics and Inventory Management
The IOMA Handbook of Logistics and Inventory Management
Practical, easy-to-implement advice on the most successful logistics management techniques being used today--from selecting the best carriers, setting logistics performance goals, and planning logistics strategies, to streamlining shipping and receiving and slashing logistics costs, and negotiating and managing third party logistics service...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy