Tài liệu Thư viện số
Danh mục TaiLieu.VN
Kết quả 85-96 trong khoảng 1195
Ebook Advanced engineering mathematics with MATLAB R (4/E): Part 2
Part 2 book "Advanced engineering mathematics with MATLAB R" includes content: Complex variables; the fourier transform; the laplace transform; the Z transform; the hilbert transform; green’s functions; probability; random processes; Itô’s stochastic calculus.
540 p truongt36 28/02/2024 8 0
Ebook Advanced engineering mathematics with MATLAB R (4/E): Part 1
Part 1 book "Advanced engineering mathematics with MATLAB R" includes content: First order ordinary differential equations; higher order ordinary differential equations; linear algebra; vector calculus; fourier series; the sturm liouville problem; the wave equation; the heat equation; laplace’s equation.
465 p truongt36 28/02/2024 7 0
Ebook Discrete mathematics and its applications (7/E): Part 2 - Kenneth H. Rosen
Part 2 book "Discrete mathematics and its applications" includes content: Advanced counting techniques, relations, graphs, trees, boolean algebra, modeling computation, suggested readings, answers to odd numbered exercises.
550 p truongt36 28/02/2024 8 0
Ebook Discrete mathematics and its applications (7/E): Part 1 - Kenneth H. Rosen
Part 1 book "Discrete mathematics and its applications" includes content: The foundations - logic and proofs; basic structures - sets, functions, sequences, sums, and matrices; algorithms; number theory and cryptography, induction and recursion; counting; discrete probability.
521 p truongt36 28/02/2024 8 0
Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 1
Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 1 includes contents: Chapter 1 WAP, Bluetooth, and 3G: A brief introduction; chapter 2 WML and WML script programming: a case study; chapter 3 WAP using cold fusion: a project; chapter 4 WTA: an advanced interaction technique for mobile phones; chapter 5 integrating java with WAP; chapter 6 push technology in WAP; chapter 7 bluetooth: a basic introduction; chapter 8 using WAP...
341 p truongt36 26/01/2024 9 0
Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 2
Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 2 includes contents: Chapter 10 An overview of 3G; chapter 11 Advanced 3G programming; chapter 12 3G programming using BREW; chapter 13 voice and video communication over IP and Mobile IP Networks; chapter 14 the future of wireless networks; appendix a what ’s on the CD-ROM; appendix b tomcat installation and configuration; appendix c SQL server 2000 installation and XML...
211 p truongt36 26/01/2024 12 0
Ebook Computer viruses hacking and malware attacks for dummies: Part 1
Ebook Computer viruses hacking and malware attacks for dummies: Part 1 includes contents: Chapter 1: understanding virus risks, chapter 2: does my computer have a virus?, chapter 3: does your computer have antivirus software?, chapter 4: obtaining and installing antivirus software, chapter 5: configuring antivirus software, chapter 6: scanning your computer and e-mail, chapter 7: ridding your computer of viruses.
130 p truongt36 26/01/2024 10 0
Ebook Computer viruses hacking and malware attacks for dummies: Part 2
Ebook Computer viruses hacking and malware attacks for dummies: Part 2 includes contents: Chapter 8: updating antivirus software and signatures; chapter 9: installing security patches; chapter 10: using firewalls and spyware blockers; chapter 11: protecting PDAs from viruses; chapter 12: incorporating safe computing practices; chapter 13: viruses and the losers whowrite them; chapter 14: trojan horses, worms, spam, and hoaxes; chapter 15: how...
160 p truongt36 26/01/2024 11 0
Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1
Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1 includes contents: Chapter 1: web application (in)security, chapter 2: core defense mechanisms, chapter 3: web application technologies, chapter 4: mapping the application, chapter 5: bypassing client-side controls, chapter 6: attacking authentication, chapter 7: attacking session management, chapter 8: attacking access controls, chapter 9:...
367 p truongt36 26/01/2024 13 0
Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2
Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2 includes contents: Chapter 10: exploiting path traversal, chapter 11: attacking application logic, chapter 12: attacking other users, chapter 13: automating bespoke attacks, chapter 14: exploiting information disclosure, chapter 15: attacking compiled applications, chapter 16: attacking application architecture, chapter 17: attacking the web...
404 p truongt36 26/01/2024 13 0
Ebook Google hacking for penetration testers: Part 2
Ebook Google hacking for penetration testers: Part 2 includes contents: Chapter 8 tracking down web servers, login portals, and network hardware; chapter 9 usernames, passwords, and secret stuff, oh my! chapter 10 document grinding and database digging; chapter 11 protecting yourself from google hackers; chapter 12 automating google searches; appendix a professional security testing; appendix b an introduction to web application security;...
284 p truongt36 26/01/2024 8 0
Ebook Google hacking for penetration testers (Volume 2): Part 2
Ebook Google hacking for penetration testers (Volume 2): Part 2 includes contents: Chapter 7: ten simple security searches that work; chapter 8: tracking down web servers, login portals, and network hardware; chapter 9: usernames, passwords, and secret stuff, oh my!; chapter 10: hacking google services; chapter 11: Google hacking showcase; chapter 12: protecting yourself from google hackers.
278 p truongt36 26/01/2024 9 0
Đăng nhập
Bộ sưu tập nổi bật