Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 9354

This seminal work presents the only comprehensive integration of significant topics in computer architecture and parallel algorithms. The text is written for designers, programmers, and engineers who need to understand these issues at a fundamental level in order to utilize the full power afforded by parallel computation. It will also be an important resource for students and researchers. Writing for an advanced general audience, the author assumes few... more...

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing... more...

With the recent proliferation of service-oriented architectures (SOA), cloud computing technologies, and distributed-interconnected systems, distributed fusion is taking on a larger role in a variety of applications—from environmental monitoring and crisis management to intelligent buildings and defense. Drawing on the work of leading experts around the world, Distributed Data Fusion for Network-Centric Operations examines the state... more...

Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the basics all the way through to more advanced concepts, its comprehensive coverage provides readers with a solid... more...

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in... more...


Containers are here and resistance is futile! Now that we're getting our heads around Docker, we need an orchestration platform to help us manage our containerized apps. Kubernetes has emerged as the hottest and most important container orchestration platform in the world. This book gets you up to speed fast, and it's constantly kept up-to-date!

The Extensible Markup Language is changing the way that information is being stored and exchanged. It is also changing the very way that we think about data. XML Unleashed allows you to unlock this new power and get you well on your way towards developing XML applications and systems that enable your most important business processes, or your simplest visions for data representation and exchange. Written for those already familiar with... more...

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources... more...

The Easy, Example-Based Guide to Ajax for Every Web Developer   Using Ajax, you can build Web applications with the sophistication and usability of traditional desktop applications and you can do it using standards and open source software. Now, for the first time, there's an easy, example-driven guide to Ajax for every Web and open source developer, regardless of experience.   Edmond Woychowsky begins... more...

Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way. As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out--binary analysis... more...