|
|
|
|
Threat Modeling: Designing for Security
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he... | | Plan, Activity, and Intent Recognition: Theory and Practice
Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning.
Plan, Activity, and Intent Recognition... | | JavaFX 8: Introduction by Example
JavaFX 8: Introduction by Example shows you how to use your existing Java skills to create graphically exciting client applications with the JavaFX 8 platform. The book is a new and much improved edition of JavaFX 2.0: Introduction by Example, taking you through a series of engaging, fun-to-work examples that bring you up to... |
|
|
The Art of Product Design: Changing How Things Get Made
Embrace Open Engineering and accelerate the design and manufacturing processes
Product development is a team sport, but most companies don't practice it that way. Organizations should be drawing on the creativity of engaged customers and outsiders, but instead they rely on the same small group of internal... | | | | C# Deconstructed: Discover how C# works on the .NET Framework
C# Deconstructed answers a seemingly simply question: Just what is going on, exactly, when you run C# code on the .NET Framework?
To answer this question we will dig ever deeper into the structure of the C# language and the onion-skin abstraction layers of the .NET Framework that underpins it. We’ll follow the ... |
|
|
|
Result Page: Previous 100 101 102 103 104 105 106 Next |