Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of sites.
Frank Gunderson
Exploring african music: unity, diversity, diaspora is designed as a core textbook on the cultural and historical diversity of music on the african continent - comparing and contrasting the regions of north, eastern, western central and southern africa.
Frank Warren
Frank Sobott
Frank Kleinehagenbrock
Frank Kleinehagenbrock
Frank Moore
Organized around the challenges migrating songbirds face when they stop over during migration, this book tracks the migratory bird's arrival at a stopover site and the challenges faced during stopover through departure and resumption of migratory flight.
Gardner, Frank
Frank Leymann
Frank Bognar
Frank R. Werner
Frank Sode
This series publishes original contributions which describe and theoretically analyze structures of natural languages.
Frank Göttmann
Frank Costigliola
Frank X. Walker
Frank H. Melland
The author undertook 11 years of research to provide this study of the bakaonde people and their neighbours inhabiting the kasempa district of northern rhodesia.
Frank X Walker
Frank Sode
This series publishes original contributions which describe and theoretically analyze structures of natural languages.
Frank Costigliola
Ulrich Frank
Die unternehmensmodellierung ist ein kernthema der wirtschaftsinformatik und der angewandten informatik in wissenschaft und praxis.
Frank Strausser
Frank Sode
This series publishes original contributions which describe and theoretically analyze structures of natural languages.
Frank Herbert
Frank Jacob
Frank Miller
L. Frank Baum
Marlena Frank
L. Frank Baum
Frank Hänsel
Frank Aragbonfoh Abumere
Frank McKinney
Frank Charles Thompson
Frank Thillez
Frank Kelleter
L. Frank Baum
Frank Accettura
Frank Miller
Frank Thillez
Frank Wagner
L. Frank Baum
Frank Thorne
Frank Cho
Ten hard-as-nails women face off in an ancient contest of champions where the winner truly takes all: the title of 'queen of the galaxy.
Frank Bruni
Frank Turek
Frank L. Cole
L. Frank Baum
Frank Ferrante
L. Frank Baum
Frank H Knight
L. Frank Baum
Frank Berrios
L. Frank Baum
Frank Krake
Frank Paul
L. Frank Baum
David Collier-Brown
Francisco Vicente Cipolla-Ficarra
Paul E. Harris
All scheduling software is difficult to learn for a number of reasons.
Eknath, Prof. Upasani Dhananjay, 1st
this book explains how to use the programming language python to develop machine learning and deep learning tasks..
Lowell W. Beineke
Algorithmic graph theory has been expanding at an extremely rapid rate since the middle of the twentieth century, in parallel with the growth of computer science and the accompanying utilization of computers, where efficient algorithms have been a prime g.
Matt Neuburg
M. L. Humphrey
M. L. Humphrey
Ahti-Veikko Pietarinen
Carl Gold
Cliff Hastings
Ahmad Sahar
Kamesh Ganesan
Neil Smyth
Yezid Donoso
Fionn Murtagh
Developed by jean-paul benz�rci more than 30 years ago, correspondence analysis as a framework for analyzing data quickly found widespread popularity in europe.
Christopher W. Totten
Written by a game developer and professor trained in architecture, an architectural approach to level design is one of the first books to integrate architectural and spatial design theory with the field of level design.
Sandip Dey
Introduces quantum inspired techniques for image analysis for pure and true gray scale/color images in a single/multi-objective environmentthis book will entice readers to design efficient meta-heuristics for image analysis in the quant.
Gigi Sayfan
Mark E. J. Newman
The study of networks, including computer networks, social networks, and biological networks, has attracted enormous interest in the last few years.
Darren George
Ibm spss statistics 25 step by step: a simple guide and reference, fifteenth edition, takes a straightforward, step-by-step approach that makes spss software clear to beginners and experienced researchers alike.
Sarah Hutt
Otto Lerbinger
"a comprehensive and engaging textbook that helps in understanding the underlying concepts and real-life strategies of communication in modern day corporate set-ups.
Ian Millington
Stefan Radl
28th european symposium on computer aided process engineering, volume 43 contains the papers presented at the 28th european society of computer-aided process engineering (escape) event held in graz, austria june 10-13, 2018.
Jonathan Reuvid
Triumph Triumph Books
Hans Petter Langtangen
Nicholas Lovell
Jose Garcia-Rodriguez
Interest in computer vision and image processing has grown in recent years with the advancement of everyday technologies such as smartphones, computer games, and social robotics.
Aaron Marks
Michael McCarthy
Scholle McFarland
Manage your schedule more effectively using calendar and reminders!
Rob Hansen
Joseph Cavanagh
The verilog language provides a means to model a digital system at many levels of abstraction from a logic gate to a complex digital system to a mainframe computer.
Prima Games
Justin Ashlock
Vanessa Hurst
Sabrina De Capitani di Vimercati
Elizabeth Tweedale
Caetano Almeida
Jon Gordon
Wolfgang Schweizer
Triumph Books
Kids and adults around the world are having the living daylights scared out of them by five nights at freddy’s (fnaf), the cute and original charmer of a horror game on mobile devices and pcs.
Hans Delfs
Modern cryptography provides essential techniques for securing information and protecting data.
Angela Rose
Aliakbar Montazer Haghighi
Presents an introduction to differential equations, probability, and stochastic processes with real-world applications of queues with delay and delayed network queuesfeaturing recent advances in queueing theory and modeling, "delayed and netwo.
George Omura
The bestselling guide to autocad, updated and expanded for the autocad 2017 release mastering autocad 2017 and autocad lt 2017 is the premier guide to the world's leading cad program.
Aaron Miller
Ajit Kumar Nayak
Computer network simulations using ns2 provides a solid foundation of computer networking knowledge and skills, covering everything from simple operating system commands to the analysis of complex network performance metrics.
Arek Dreyer
This is officially-authorized apple pro training series work is a top-notch primer for anyone who needs to implement, administer, or maintain a network that uses os x server on el capitan.
Ion Bica
This book constitutes the thoroughly refereed post-conference proceedings of the 8th international conference on security for information technology and communications, secitc 2015, held in bucharest, romania, in june 2015.
Zhigeng Pan
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based l.
Aaron Marcus
The three-volume set lncs 9746, 9747, and 9748 constitutes the proceedings of the 5th international conference on design, user experience, and usability, duxu 2016, held as part of the 18th international conference on human-computer interaction, hcii 2016.