Home | Amazing | Today | Tags | Publishers | Years | Search 
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Real-Time Systems: Modeling, Design, and Applications (Amast Series in Computing)
Real-Time Systems: Modeling, Design, and Applications (Amast Series in Computing)
This book collects the efforts developed by a series of researchers, presented at AMAST Workshops on Real-Time Systems. The authors whose papers were selected for this book are major players in this area, and they were given the opportunity to refine the text of their papers as a result of the lively discussions that took place during the...
Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
The only Cisco-endorsed study guide for the new CCNA #640-507 examCoverage of all CCNA exam topics enables you to discover and fill your knowledge gaps before sitting the exam. You will learn about:Internetworking functions of each layer of the OSI reference model and how they are performed in network devicesDesign, implementation, configuration,...
Analog Behavioral Modeling with the Verilog-A Language
Analog Behavioral Modeling with the Verilog-A Language
Analog Behavioral Modeling With The Verilog-A Language provides the IC designer with an introduction to the methodologies and uses of analog behavioral modeling with the Verilog-A language. In doing so, an overview of Verilog-A language constructs as well as applications using the language are presented. In addition, the book is...
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)
Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty....
Embedded Systems Handbook (Industrial Information Technology)
Embedded Systems Handbook (Industrial Information Technology)
The purpose of the Embedded Systems Handbook is to provide a reference useful to a broad range of professionals and researchers from industry and academia involved in the evolution of concepts and technologies, as well as development and use of embedded systems and related technologies.

The book provides a comprehensive overview of the
...
Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
The objective of Document Analysis and Recognition (DAR) is to recognize the text and graphical components of a document and to extract information. With first papers dating back to the 1960’s, DAR is a mature but still growing research field with consolidated and known techniques. Optical Character Recognition (OCR) engines are some of the...
Design, Automation, and Test in Europe: The Most Influential Papers of 10 Years DATE
Design, Automation, and Test in Europe: The Most Influential Papers of 10 Years DATE
The Design, Automation and Test in Europe (DATE) conference celebrated in 2007 its tenth anniversary. As a tribute to the chip and system-level design and design technology community, this book presents a compilation of the three most influential papers of each year. This provides an excellent historical overview of the evolution of a domain that...
Constructing Correct Software (Formal Approaches to Computing and Information Technology)
Constructing Correct Software (Formal Approaches to Computing and Information Technology)
Central to Formal Methods is the so-called Correctness Theorem which relates a specification to its correct Implementations. This theorem is the goal of traditional program testing and, more recently, of program verification (in which the theorem must be proved). Proofs are difficult, though even with the use of powerful theorem provers. This...
Integrated Formal Methods: 4th International Conference, IFM 2004, Canterbury
Integrated Formal Methods: 4th International Conference, IFM 2004, Canterbury
The fourth conference in the series of international meetings on Integrated Formal Methods, IFM, was held in Canterbury, UK, 4–7 April 2004. The conference was organized by the Computing Laboratory at the University of Kent, whose main campus is just outside the ancient town of Canterbury, part of the county of Kent.

Kent is
...
Declarative Agent Languages and Technologies: First International Workshop, DALT 2003, Melbourne, Australia
Declarative Agent Languages and Technologies: First International Workshop, DALT 2003, Melbourne, Australia
The growing complexity of agent systems calls for models and technologies that allow for system predictability and enable feature discovery and verification. Formal methods and declarative technologies have recently attracted a growing interest as a means for dealing with such issues.

This book presents revised and extended versions of 11...

Tools and Algorithms for the Construction and Analysis of Systems: 10th International Conference, TACAS 2004, Held as Part of the Joint European Conferences
Tools and Algorithms for the Construction and Analysis of Systems: 10th International Conference, TACAS 2004, Held as Part of the Joint European Conferences

This volume contains the proceedings of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004). TACAS 2004 took place in Barcelona, Spain, from March 29th to April 2nd, as part of the 7th European Joint Conferences on Theory and Practice of Software (ETAPS 2004), whose aims,...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy