Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Mathematica Cookbook
Mathematica Cookbook

Mathematica Cookbook helps you master the application's core principles by walking you through real-world problems. Ideal for browsing, this book includes recipes for working with numerics, data structures, algebraic equations, calculus, and statistics. You'll also venture into exotic territory with recipes for data...

Digital Nets and Sequences: Discrepancy Theory and Quasi-Monte Carlo Integration
Digital Nets and Sequences: Discrepancy Theory and Quasi-Monte Carlo Integration

Indispensable for students, invaluable for researchers, this comprehensive treatment of contemporary quasi-Monte Carlo methods, digital nets and sequences, and discrepancy theory starts from scratch with detailed explanations of the basic concepts and then advances to current methods used in research. As deterministic versions of the Monte...

Algorithm-Architecture Matching for Signal and Image Processing
Algorithm-Architecture Matching for Signal and Image Processing

Advances in signal and image processing together with increasing computing power are bringing mobile technology closer to applications in a variety of domains like automotive, health, telecommunication, multimedia, entertainment and many others. The development of these leading applications, involving a large diversity of algorithms...

The Ayahuasca Diaries
The Ayahuasca Diaries

A lively travelogue, this book follows the author's psycho-spiritual odyssey in search of ayahuasca—a dark, psychedelic brew known as “the vine of the dead."  Trekking through the rain forests of Peru, Colombia, Brazil, Venezuela, and Ecuador in search...

Water Quality & Treatment: A Handbook on Drinking Water
Water Quality & Treatment: A Handbook on Drinking Water

This sixth edition of Water Quality & Treatment: A Handbook on Drinking Water serves as a handbook for scientists, engineers, and other professionals who study and work in drinking water—particularly the quality of water supplies, the quality of treated drinking water, and water treatment processes. It is meant as a resource for...

Fundamentals of Error-Correcting Codes
Fundamentals of Error-Correcting Codes

Fundamentals of Error Correcting Codes is an in-depth introduction to coding theory from both an engineering and mathematical viewpoint. It reviews classical topics, and gives much coverage of recent techniques which could previously only be found in specialist publications. Numerous exercises and examples and an accessible writing style make...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Link Mining: Models, Algorithms, and Applications
Link Mining: Models, Algorithms, and Applications

This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are...

Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

unlimited object storage image
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy