Quantcast
Browsing all 3629 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Real-Time Object Uniform Design Methodology with UML

Bui Minh Duc – Real-Time Object Uniform Design Methodology with UML Published: 2007-06-27 | ISBN: 1402059760 | PDF | 482 pages | 15 MB This multi-function volume starts off as an ideal basic textbook...

View Article


Image may be NSFW.
Clik here to view.

Applied Quantum Cryptography

Christian Kollmitzer, Mario Pivk – Applied Quantum Cryptography Published: 2010-02-19 | ISBN: 3642048293 | PDF | 242 pages | 5 MB Using the quantum properties of single photons to exchange binary keys...

View Article


Image may be NSFW.
Clik here to view.

Apache Cookbook: Solutions and Examples for Apache Administrators

Apache Cookbook: Solutions and Examples for Apache Administrators By Rich Bowen, Ken Coar English | Second edition 2008 | 320 Pages | ISBN: 0596529945 | PDF | 3.4 MB There’s plenty of documentation on...

View Article

Image may be NSFW.
Clik here to view.

The Semantic Web: Real-World Applications from Industry

Jorge Cardoso, Martin Hepp, Miltiadis D. Lytras – The Semantic Web: Real-World Applications from Industry Published: 2010-11-23 | ISBN: 1441943048 | PDF | 308 pages | 5 MB This professional book...

View Article

Image may be NSFW.
Clik here to view.

The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd...

Ralph Kimball and Margy Ross, “The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd edition” English | ISBN: 1118530802 | 2013 | PDF, EPUB | 600 pages | 23 MB The most...

View Article


Image may be NSFW.
Clik here to view.

FortiGate Multi-Threat Security Systems. Secured Network Deployment and IPSec...

FortiGate Multi-Threat Security Systems. Secured Network Deployment and IPSec VPN. Student Guide (Course 301-v4.0) By Fortinet Training Services 2009 | 610 Pages | ISBN: n/a | PDF | 65 MB The Secured...

View Article

Image may be NSFW.
Clik here to view.

Cherie Amon, Check Point Next Generation Security Administration

Cherie Amon, Check Point Next Generation Security Administration ISBN: 1928994741 | edition 2002 | PDF | 657 pages | 8 mb Unparalleled security management that IT professionals have been waiting for....

View Article

Image may be NSFW.
Clik here to view.

Security for Wireless Implantable Medical Devices

Security for Wireless Implantable Medical Devices By Xiali Hei, Xiaojiang Du 2013 | 56 Pages | ISBN: 1461471524 | PDF | 2 MB In the treatment of chronic diseases, wireless Implantable Medical Devices...

View Article


Image may be NSFW.
Clik here to view.

Algorithmic Cryptanalysis

Antoine Joux, “Algorithmic Cryptanalysis” 2009 | ISBN: 1420070029 | 519 pages | PDF | 4,6 MB Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods...

View Article


Image may be NSFW.
Clik here to view.

Pluralsight – Introduction to Machine Learning with ENCOG 3

Pluralsight – Introduction to Machine Learning with ENCOG 3 English | .MP4 | h264, yuv420p, 1024×768, 464 kb/s, 1000.00 fp | aac, 44100 Hz, 127 kb/s | 312 Mb Genre: eLearning This course is focused on...

View Article

Image may be NSFW.
Clik here to view.

SAP Implementation Unleashed: A Business and Technical Roadmap to Deploying SAP

SAP Implementation Unleashed: A Business and Technical Roadmap to Deploying SAP By George W. Anderson, Charles D. Nilson and more 2009 | 888 Pages | ISBN: 0672330040 | PDF | 10 MB SAP can help you...

View Article

Image may be NSFW.
Clik here to view.

Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting...

Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard, “Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code” W..y (11-2010) | PDF + ISO | 744 pages | ISBN:...

View Article

Image may be NSFW.
Clik here to view.

Security Engineering with Patterns: Origins, Theoretical Models, and New...

Security Engineering with Patterns: Origins, Theoretical Models, and New Applications By Markus Schumacher 2003 | 208 Pages | ISBN: 3540407316 | PDF | 2 MB For quite some time, in systems and software...

View Article


Image may be NSFW.
Clik here to view.

Kumar Reddy, Building MPLS-Based Broadband Access VPNs

  Kumar Reddy, Building MPLS-Based Broadband Access VPNs ISBN: 1587051362 | edition 2004 | CHM | 408 pages | 5 mb Implement the design principles and configurations behind MPLS-based VPNs for...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Essentials

James Graham, Ryan Olson, “Cyber Security Essentials” 2011 | ISBN-10: 1439851239 | 341 pages | PDF | 8,6 MB The sophisticated methods used in recent high-profile cyber incidents have driven many to...

View Article


Image may be NSFW.
Clik here to view.

“Theory and Practice of Cryptography and Network Security Protocols and...

“Theory and Practice of Cryptography and Network Security Protocols and Technologies” ed. by Jaydip Sen InTeOpP | 2013 | ISBN: 9535111764 9789535111764 | 155 pages | PDF | 5 MB This book presents a...

View Article

Image may be NSFW.
Clik here to view.

Internet and surveillance: the challenges of Web 2.0 and social media

Internet and surveillance: the challenges of Web 2.0 and social media / edited by Christian Fuchs, Kees Boersma, Anders Albrechtslund, Marisol Sandoval Publisher: Routledge | ISBN: 0415891604,...

View Article


Image may be NSFW.
Clik here to view.

The intensification of surveillance: crime, terrorism and warfare in the...

The intensification of surveillance: crime, terrorism and warfare in the information age / edited by Kirstie Ball, Frank Webster Publisher: Pluto Press | ISBN: 0745319947, 9780745319940, 0745319955,...

View Article

Image may be NSFW.
Clik here to view.

Crime online

Crime online / edited by Yvonne Jewkes Publisher: Willan Publishing / Routledge | ISBN: 1843921987, 9781843921981, 1843921979, 9781843921974, 1843925826, 9781843925828 | 2006 | PDF | 198 pages | 1,02...

View Article

Image may be NSFW.
Clik here to view.

Aggressive Network Self-Defense

Neil R. Wyler, Bruce Potter, Chris Hurley, “Aggressive Network Self-Defense” English | 2005 | ISBN: 1931836205 | PDF | 417 pages | 82,9 mb Over the past year there has been a shift within the computer...

View Article
Browsing all 3629 articles
Browse latest View live