Real-Time Object Uniform Design Methodology with UML
Bui Minh Duc – Real-Time Object Uniform Design Methodology with UML Published: 2007-06-27 | ISBN: 1402059760 | PDF | 482 pages | 15 MB This multi-function volume starts off as an ideal basic textbook...
View ArticleApplied Quantum Cryptography
Christian Kollmitzer, Mario Pivk – Applied Quantum Cryptography Published: 2010-02-19 | ISBN: 3642048293 | PDF | 242 pages | 5 MB Using the quantum properties of single photons to exchange binary keys...
View ArticleApache Cookbook: Solutions and Examples for Apache Administrators
Apache Cookbook: Solutions and Examples for Apache Administrators By Rich Bowen, Ken Coar English | Second edition 2008 | 320 Pages | ISBN: 0596529945 | PDF | 3.4 MB There’s plenty of documentation on...
View ArticleThe Semantic Web: Real-World Applications from Industry
Jorge Cardoso, Martin Hepp, Miltiadis D. Lytras – The Semantic Web: Real-World Applications from Industry Published: 2010-11-23 | ISBN: 1441943048 | PDF | 308 pages | 5 MB This professional book...
View ArticleThe Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd...
Ralph Kimball and Margy Ross, “The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd edition” English | ISBN: 1118530802 | 2013 | PDF, EPUB | 600 pages | 23 MB The most...
View ArticleFortiGate Multi-Threat Security Systems. Secured Network Deployment and IPSec...
FortiGate Multi-Threat Security Systems. Secured Network Deployment and IPSec VPN. Student Guide (Course 301-v4.0) By Fortinet Training Services 2009 | 610 Pages | ISBN: n/a | PDF | 65 MB The Secured...
View ArticleCherie Amon, Check Point Next Generation Security Administration
Cherie Amon, Check Point Next Generation Security Administration ISBN: 1928994741 | edition 2002 | PDF | 657 pages | 8 mb Unparalleled security management that IT professionals have been waiting for....
View ArticleSecurity for Wireless Implantable Medical Devices
Security for Wireless Implantable Medical Devices By Xiali Hei, Xiaojiang Du 2013 | 56 Pages | ISBN: 1461471524 | PDF | 2 MB In the treatment of chronic diseases, wireless Implantable Medical Devices...
View ArticleAlgorithmic Cryptanalysis
Antoine Joux, “Algorithmic Cryptanalysis” 2009 | ISBN: 1420070029 | 519 pages | PDF | 4,6 MB Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods...
View ArticlePluralsight – Introduction to Machine Learning with ENCOG 3
Pluralsight – Introduction to Machine Learning with ENCOG 3 English | .MP4 | h264, yuv420p, 1024×768, 464 kb/s, 1000.00 fp | aac, 44100 Hz, 127 kb/s | 312 Mb Genre: eLearning This course is focused on...
View ArticleSAP Implementation Unleashed: A Business and Technical Roadmap to Deploying SAP
SAP Implementation Unleashed: A Business and Technical Roadmap to Deploying SAP By George W. Anderson, Charles D. Nilson and more 2009 | 888 Pages | ISBN: 0672330040 | PDF | 10 MB SAP can help you...
View ArticleMalware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting...
Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard, “Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code” W..y (11-2010) | PDF + ISO | 744 pages | ISBN:...
View ArticleSecurity Engineering with Patterns: Origins, Theoretical Models, and New...
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications By Markus Schumacher 2003 | 208 Pages | ISBN: 3540407316 | PDF | 2 MB For quite some time, in systems and software...
View ArticleKumar Reddy, Building MPLS-Based Broadband Access VPNs
Kumar Reddy, Building MPLS-Based Broadband Access VPNs ISBN: 1587051362 | edition 2004 | CHM | 408 pages | 5 mb Implement the design principles and configurations behind MPLS-based VPNs for...
View ArticleCyber Security Essentials
James Graham, Ryan Olson, “Cyber Security Essentials” 2011 | ISBN-10: 1439851239 | 341 pages | PDF | 8,6 MB The sophisticated methods used in recent high-profile cyber incidents have driven many to...
View Article“Theory and Practice of Cryptography and Network Security Protocols and...
“Theory and Practice of Cryptography and Network Security Protocols and Technologies” ed. by Jaydip Sen InTeOpP | 2013 | ISBN: 9535111764 9789535111764 | 155 pages | PDF | 5 MB This book presents a...
View ArticleInternet and surveillance: the challenges of Web 2.0 and social media
Internet and surveillance: the challenges of Web 2.0 and social media / edited by Christian Fuchs, Kees Boersma, Anders Albrechtslund, Marisol Sandoval Publisher: Routledge | ISBN: 0415891604,...
View ArticleThe intensification of surveillance: crime, terrorism and warfare in the...
The intensification of surveillance: crime, terrorism and warfare in the information age / edited by Kirstie Ball, Frank Webster Publisher: Pluto Press | ISBN: 0745319947, 9780745319940, 0745319955,...
View ArticleCrime online
Crime online / edited by Yvonne Jewkes Publisher: Willan Publishing / Routledge | ISBN: 1843921987, 9781843921981, 1843921979, 9781843921974, 1843925826, 9781843925828 | 2006 | PDF | 198 pages | 1,02...
View ArticleAggressive Network Self-Defense
Neil R. Wyler, Bruce Potter, Chris Hurley, “Aggressive Network Self-Defense” English | 2005 | ISBN: 1931836205 | PDF | 417 pages | 82,9 mb Over the past year there has been a shift within the computer...
View Article