June 2016 | SD Ghost in the Shell | Другое
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model
Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model

When we, the authors of this book, first learned what Microsoft’s plans were for Analysis Services in the SQL Server 2012 release, we were not happy. Analysis Services hadn’t acquired much in the way of new features since 2005, even though in the meantime it had grown to become the biggest-selling OLAP tool. It seemed as...

Software Metrics and Software Metrology
Software Metrics and Software Metrology

Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at the classical metrology concepts from science and engineering, using them as criteria to propose an approach to analyze the design of current software measures and then design new software...

Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms (Princeton Series in Applied Mathematics)
Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms (Princeton Series in Applied Mathematics)
This book covers its subject very thoroughly. The framework the authors have established is very elegant and, if it catches on, this book could be the primary reference for this approach. I don't know of any other book that covers this set of topics.
(Richard M. Murray, California Institute of Technology )

This...

SQL The Complete Reference, 3rd Edition
SQL The Complete Reference, 3rd Edition

Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. 

SQL: The Complete Reference, Third...

Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Optimization of adaptive signal processing algorithms for wireless communications is based on a model of the underlying propagation channel. In practice, this model is never known perfectly. For example, its parameters have to be estimated and are only known with significant errors.

In this book, a systematic treatment of this practical design...

Random Processes by Example
Random Processes by Example

This volume first introduces the mathematical tools necessary for understanding and working with a broad class of applied stochastic models. The toolbox includes Gaussian processes, independently scattered measures such as Gaussian white noise and Poisson random measures, stochastic integrals, compound Poisson, infinitely divisible and stable...

Mastering Data Warehouse Aggregates: Solutions for Star Schema Performance
Mastering Data Warehouse Aggregates: Solutions for Star Schema Performance
The first book to offer in-depth coverage of star schema aggregate tables

 

Dubbed by Ralph Kimball as the most effective technique for maximizing star schema performance, dimensional aggregates are a powerful and efficient tool that can accelerate data warehouse queries more dramatically than any other technology. After you ensure...

CCIE® Practical Studies, Volume I
CCIE® Practical Studies, Volume I

Cisco Certified Internetwork Expert (CCIE) certification is the most difficult and most rewarding of the Cisco(r) certifications. Although the professional and financial benefits of a CCIE are excellent, attaining this level of certification takes years of experience, study, and effort. Serving a dual role of networking...

Result Page: 37 36 35 34 33 32 31 30 29 28 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy