• Ebook Advanced engineering mathematics with MATLAB R (4/E): Part 2

    Ebook Advanced engineering mathematics with MATLAB R (4/E): Part 2

    Part 2 book "Advanced engineering mathematics with MATLAB R" includes content: Complex variables; the fourier transform; the laplace transform; the Z transform; the hilbert transform; green’s functions; probability; random processes; Itô’s stochastic calculus.

     540 p truongt36 28/02/2024 8 0

  • Ebook Advanced engineering mathematics with MATLAB R (4/E): Part 1

    Ebook Advanced engineering mathematics with MATLAB R (4/E): Part 1

    Part 1 book "Advanced engineering mathematics with MATLAB R" includes content: First order ordinary differential equations; higher order ordinary differential equations; linear algebra; vector calculus; fourier series; the sturm liouville problem; the wave equation; the heat equation; laplace’s equation.

     465 p truongt36 28/02/2024 7 0

  • Ebook Discrete mathematics and its applications (7/E): Part 2 - Kenneth H. Rosen

    Ebook Discrete mathematics and its applications (7/E): Part 2 - Kenneth H. Rosen

    Part 2 book "Discrete mathematics and its applications" includes content: Advanced counting techniques, relations, graphs, trees, boolean algebra, modeling computation, suggested readings, answers to odd numbered exercises.

     550 p truongt36 28/02/2024 8 0

  • Ebook Discrete mathematics and its applications (7/E): Part 1 - Kenneth H. Rosen

    Ebook Discrete mathematics and its applications (7/E): Part 1 - Kenneth H. Rosen

    Part 1 book "Discrete mathematics and its applications" includes content: The foundations - logic and proofs; basic structures - sets, functions, sequences, sums, and matrices; algorithms; number theory and cryptography, induction and recursion; counting; discrete probability.

     521 p truongt36 28/02/2024 8 0

  • Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 1

    Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 1

    Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 1 includes contents: Chapter 1 WAP, Bluetooth, and 3G: A brief introduction; chapter 2 WML and WML script programming: a case study; chapter 3 WAP using cold fusion: a project; chapter 4 WTA: an advanced interaction technique for mobile phones; chapter 5 integrating java with WAP; chapter 6 push technology in WAP; chapter 7 bluetooth: a basic introduction; chapter 8 using WAP...

     341 p truongt36 26/01/2024 9 0

  • Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 2

    Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 2

    Ebook WAP, Bluetooth, and 3G programming: Cracking the code – Part 2 includes contents: Chapter 10 An overview of 3G; chapter 11 Advanced 3G programming; chapter 12 3G programming using BREW; chapter 13 voice and video communication over IP and Mobile IP Networks; chapter 14 the future of wireless networks; appendix a what ’s on the CD-ROM; appendix b tomcat installation and configuration; appendix c SQL server 2000 installation and XML...

     211 p truongt36 26/01/2024 12 0

  • Ebook Computer viruses hacking and malware attacks for dummies: Part 1

    Ebook Computer viruses hacking and malware attacks for dummies: Part 1

    Ebook Computer viruses hacking and malware attacks for dummies: Part 1 includes contents: Chapter 1: understanding virus risks, chapter 2: does my computer have a virus?, chapter 3: does your computer have antivirus software?, chapter 4: obtaining and installing antivirus software, chapter 5: configuring antivirus software, chapter 6: scanning your computer and e-mail, chapter 7: ridding your computer of viruses.

     130 p truongt36 26/01/2024 10 0

  • Ebook Computer viruses hacking and malware attacks for dummies: Part 2

    Ebook Computer viruses hacking and malware attacks for dummies: Part 2

    Ebook Computer viruses hacking and malware attacks for dummies: Part 2 includes contents: Chapter 8: updating antivirus software and signatures; chapter 9: installing security patches; chapter 10: using firewalls and spyware blockers; chapter 11: protecting PDAs from viruses; chapter 12: incorporating safe computing practices; chapter 13: viruses and the losers whowrite them; chapter 14: trojan horses, worms, spam, and hoaxes; chapter 15: how...

     160 p truongt36 26/01/2024 11 0

  • Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1 includes contents: Chapter 1: web application (in)security, chapter 2: core defense mechanisms, chapter 3: web application technologies, chapter 4: mapping the application, chapter 5: bypassing client-side controls, chapter 6: attacking authentication, chapter 7: attacking session management, chapter 8: attacking access controls, chapter 9:...

     367 p truongt36 26/01/2024 13 0

  • Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2 includes contents: Chapter 10: exploiting path traversal, chapter 11: attacking application logic, chapter 12: attacking other users, chapter 13: automating bespoke attacks, chapter 14: exploiting information disclosure, chapter 15: attacking compiled applications, chapter 16: attacking application architecture, chapter 17: attacking the web...

     404 p truongt36 26/01/2024 13 0

  • Ebook Google hacking for penetration testers: Part 2

    Ebook Google hacking for penetration testers: Part 2

    Ebook Google hacking for penetration testers: Part 2 includes contents: Chapter 8 tracking down web servers, login portals, and network hardware; chapter 9 usernames, passwords, and secret stuff, oh my! chapter 10 document grinding and database digging; chapter 11 protecting yourself from google hackers; chapter 12 automating google searches; appendix a professional security testing; appendix b an introduction to web application security;...

     284 p truongt36 26/01/2024 8 0

  • Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2 includes contents: Chapter 7: ten simple security searches that work; chapter 8: tracking down web servers, login portals, and network hardware; chapter 9: usernames, passwords, and secret stuff, oh my!; chapter 10: hacking google services; chapter 11: Google hacking showcase; chapter 12: protecting yourself from google hackers.

     278 p truongt36 26/01/2024 9 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=truongt36