Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Causes of War
Causes of War

Written by leading scholars in the field, Causes of War provides the first comprehensive analysis of the leading theories relating to the origins of both interstate and civil wars.

  • Utilizes historical examples to illustrate individual theories throughout
  • Includes an analysis of theories of civil wars...
Operating Systems In Depth: Design and Programming
Operating Systems In Depth: Design and Programming

The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), fi le systems, and security. However, I also cover issues that come up...

Principles of Geometry (Cambridge Library Collection - Mathematics)
Principles of Geometry (Cambridge Library Collection - Mathematics)

Henry Frederick Baker (1866-1956) was a renowned British mathematician specialising in algebraic geometry. First published between 1922 and 1925, this six-volume work provides a detailed insight into the geometry which was developing at the time of publication. Volume 1 describes the foundations of projective geometry.

...
Knowledge Representation, Reasoning and Declarative Problem Solving
Knowledge Representation, Reasoning and Declarative Problem Solving
This book is about the language of logic programming with answer set semantics and its application to knowledge representation reasoning and declarative problem solving This book will be useful to researchers in logic programming declarative programming articial intelligence knowledge representation and autonomous agents to...
Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution
Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution

The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information systems running today in many organizations were developed many years ago with technologies that are now obsolete. These old systems, known as legacy...

Pragmatic Guide to Subversion (Pragmatic Guides)
Pragmatic Guide to Subversion (Pragmatic Guides)

Subversion sets the standard in version control systems. Championed by open-source developers, Subversion is behind some of today's biggest and most important software, including Apache, FreeBSD, Ruby, and MediaWiki. But more than just a tool for open-source collaboration, Subversion has made a significant impact in the corporate...

Canvas Pocket Reference: Scripted Graphics for HTML5
Canvas Pocket Reference: Scripted Graphics for HTML5

The Canvas element is a revolutionary feature of HTML5 that enables powerful graphics for rich Internet applications, and this pocket reference provides the essentials you need to put this element to work. If you have working knowledge of JavaScript, this book will help you create detailed, interactive, and animated graphics -- from...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Digital Sculpting with Mudbox: Essential Tools and Techniques for Artists
Digital Sculpting with Mudbox: Essential Tools and Techniques for Artists

Digital sculpting is the use of tools to push, pull, smooth, grab, pinch or otherwise manipulate a digital object as if it were made of a real-life substance such as clay. Mudbox is the premier sculpting solution for digital artists, allowing them to naturally and easily sculpt detailed, organic characters and models in a way that feels like...

Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy