Home | Amazing | Today | Tags | Publishers | Years | Search 
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
This edited book contains articles accepted for presentation during the conference "Intelligent Information Systems 2005 (IIS 2005) - New Trends in Intelligent Information Processing and Web Mining" held in Gdansk, Poland, on June 13-16, 2005. Special attention is devoted to the newest developments in the areas of Artificial Immune...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
CCDA Exam Certification Guide ((CP) CERTIFICATION)
CCDA Exam Certification Guide ((CP) CERTIFICATION)
The official study guide for DCN exam #640-441Coverage of the CCDA exam design objectives enables you to discover your knowledge gaps before the exam date. You'll learn to:Characterize a customer's existing network and identify customer needsSimplify the complexities associated with analyzing customer network problems and creating Cisco scalable...
Discovery Science: 7th International Conference, DS 2004, Padova, Italy, October 2-5, 2004. Proceedings (Lecture Notes in Computer Science)
Discovery Science: 7th International Conference, DS 2004, Padova, Italy, October 2-5, 2004. Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the 7th International Conference on Discovery Science, DS 2004, held in Padova, Italy in October 2004.

The 20 revised long papers and the 19 revised regular papers presented were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on pattern mining,...

CCDP: Cisco Internetwork Design Study Guide
CCDP: Cisco Internetwork Design Study Guide
Looking to advance your career as a network designer or integrator? Here's the study guide you need to prepare for the Cisco Internetwork Design exam, the final step in the Cisco Certified Design Professional program. With full coverage of each Cisco exam objective, this study guide delivers the goods on crucial design issues--from CANs, MANs, and...
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

ActionScript 3.0 Game Programming University
ActionScript 3.0 Game Programming University
Gary Rosenzweig's ActionScript 3.0 Game Programming University shows you how  to use ActionScript, the programming language behind Flash CS3 Professional. The lessons teach you all the basics of ActionScript programming through game examples, but the code can be easily adapted to non-game-oriented projects, such as web training and...
Information Modelling and Knowledge Bases XV (Frontiers in Artificial Intelligence and Applications)
Information Modelling and Knowledge Bases XV (Frontiers in Artificial Intelligence and Applications)
This book provides research communities in Europe and Japan with an overview of scientific results and experiences achieved using innovative methods and approaches in computer science and other disciplines, which have a common interest in understanding and solving problems on information modelling and knowledge bases, as well as applying the...
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
This two-volume book covers the recent applications of computational intelligence techniques in reliability engineering. Research in the area of computational intelligence is growing rapidly due to the many successful applications of these new techniques in very diverse problems. “Computational Intelligence” covers many fields such as...
Sensor Based Intelligent Robots: International Workshop, Dagstuhl Castle, Germany, October 15-20, 2000. Selected Revised Papers
Sensor Based Intelligent Robots: International Workshop, Dagstuhl Castle, Germany, October 15-20, 2000. Selected Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Sensor Based Intelligent Robots held in Dagstuhl Castle, Germany, in October 2000.

The 20 revised full papers were carefully reviewed and improved for inclusion in this book. Addressing a broad variety of aspects of the highly
...
Scheduling Algorithms
Scheduling Algorithms
From the reviews of the fourth edition: 

"This is a book about scheduling algorithms. … The book contains eleven chapters. … Most of the chapters contain the summarized complexity results. In this edition the complexity columns have been updated. The book is completed by the bibliography which also has been updated and...

Result Page: 717 716 715 714 713 712 711 710 709 708 707 706 705 704 703 702 701 700 699 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy