 |
|
|
 Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... |  |  Telling Stories: A Short Path to Writing Better Software RequirementsFrom systems designers to top management, everyone loves a good story
Once upon a time, it was well understood that stories teach better than plain facts. Why then are most software requirements documents a baffling hodge-podge of diagrams, data dictionaries, and bullet points, held together by little more than a name and a staple?... |  |  Level Sets and Extrema of Random Processes and FieldsLevel Sets and Extrema of Random Processes and Fields discusses how to understand the properties of the level sets of paths as well as how to compute the probability distribution of its extremal values, which are two general classes of problems that arise in the study of random processes and fields and in related applications. This book... |
|
|
|
Result Page: Previous 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 Next |