Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Sensitivity Principle in Epistemology
The Sensitivity Principle in Epistemology

The sensitivity principle is a compelling idea in epistemology and is typically characterized as a necessary condition for knowledge. This collection of thirteen new essays constitutes a state-of-the-art discussion of this important principle. Some of the essays build on and strengthen sensitivity-based accounts of knowledge and offer novel...

Modern Statistical Methods for Astronomy: With R Applications
Modern Statistical Methods for Astronomy: With R Applications

Modern astronomical research is beset with a vast range of statistical challenges, ranging from reducing data from megadatasets to characterizing an amazing variety of variable celestial objects or testing astrophysical theory. Linking astronomy to the world of modern statistics, this volume is a unique resource, introducing astronomers to...

Linear Algebra and Geometry
Linear Algebra and Geometry

This book is the result of a series of lectures on linear algebra and the geometry of multidimensional spaces given in the 1950s through 1970s by Igor R. Shafarevich at the Faculty of Mechanics and Mathematics of Moscow State University.

Notes for some of these lectures were preserved in the faculty library, and these were used...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis

As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.

One approach especially intrigued me. John Guttag and Jim
...

Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)
Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)

Social Semantics: The Search for Meaning on the Web provides a unique introduction to identity and reference theories of the World Wide Web, through the academic lens of philosophy of language and data-driven statistical models. The Semantic Web is a natural evolution of the Web, and this book covers the URL-based Web architecture...

Adobe Muse: Classroom in a Book
Adobe Muse: Classroom in a Book

Those creative professionals seeking the fastest, easiest, most comprehensive way to learn Adobe Muse choose Adobe Muse Classroom in a Book from the Adobe Creative Team at Adobe Press. The 10 project-based lessons in this book show readers step-by-step the key techniques for working in Muse.

...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Think Complexity: Complexity Science and Computational Modeling
Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is usually not taught at...
Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy