 |
|
 The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... |  |  Real-Time Systems: Modeling, Design, and Applications (Amast Series in Computing)This book collects the efforts developed by a series of researchers, presented at AMAST Workshops on Real-Time Systems. The authors whose papers were selected for this book are major players in this area, and they were given the opportunity to refine the text of their papers as a result of the lively discussions that took place during the... |  |  Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)The only Cisco-endorsed study guide for the new CCNA #640-507 examCoverage of all CCNA exam topics enables you to discover and fill your knowledge gaps before sitting the exam. You will learn about:Internetworking functions of each layer of the OSI reference model and how they are performed in network devicesDesign, implementation, configuration,... |
|
 Analog Behavioral Modeling with the Verilog-A LanguageAnalog Behavioral Modeling With The Verilog-A Language provides the IC designer with an introduction to the methodologies and uses of analog behavioral modeling with the Verilog-A language. In doing so, an overview of Verilog-A language constructs as well as applications using the language are presented. In addition, the book is... |  |  Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty.... |  |  Embedded Systems Handbook (Industrial Information Technology)The purpose of the Embedded Systems Handbook is to provide a reference useful to a broad range of professionals and researchers from industry and academia involved in the evolution of concepts and technologies, as well as development and use of embedded systems and related technologies.
The book provides a comprehensive overview of the... |
|
 |  |  Design, Automation, and Test in Europe: The Most Influential Papers of 10 Years DATEThe Design, Automation and Test in Europe (DATE) conference celebrated in 2007 its tenth anniversary. As a tribute to the chip and system-level design and design technology community, this book presents a compilation of the three most influential papers of each year. This provides an excellent historical overview of the evolution of a domain that... |  |  |
|
 Integrated Formal Methods: 4th International Conference, IFM 2004, CanterburyThe fourth conference in the series of international meetings on Integrated Formal Methods, IFM, was held in Canterbury, UK, 4–7 April 2004. The conference was organized by the Computing Laboratory at the University of Kent, whose main campus is just outside the ancient town of Canterbury, part of the county of Kent.
Kent is... |  |  |  |  |
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |