IT eBooks
Download, Read, Use
Hacking VoIP
Hacking VoIP

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. ...
Realm of Racket
Realm of Racket

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language. In Realm of Racket, you'll learn to program by creating increasingly complex games. Your journey begins with the Guess My Number game and coverage of some basic Racket etiquette. Next you'll dig into syntax and semantics, lists, structures, and conditionals, and learn to work with recursion and the GUI as you build the Robot Snake game. After that it's on to lambda and mutant structs (and an Orc Battle), and fancy loops and the Dice of Doom. Finally, you'll explore laziness, AI, distributed games, and the Hungry Henry game. ...
Game Invaders
Game Invaders

Presenting a holistic and thoroughly practical investigation of the true nature of computer games that arms readers with a small yet powerful set of theories for developing unique approaches to understanding games. Game Invaders fully integrates genre theory, new media aesthetics, perceptual opportunities, and semiotics into a practical DIY toolkit for games analysis—offering detailed guidance for how to conduct in-depth critiques of game content and gameplay. Featuring an informal and witty writing style, the book devotes a number of chapters to specific games from all eras, clearly demonstrating the practical application of the theories to modern, large-scale computer games. ...
Guidebook to R Graphics Using Microsoft Windows
Guidebook to R Graphics Using Microsoft Windows

Due to its flexibility and availability, R has become the computing software of choice for statistical computing and generating graphics across various fields of research. Guidebook to R Graphics Using Microsoft® Windows offers a unique presentation of R, guiding new users through its many benefits, including the creation of high-quality graphics. Beginning with getting the program up and running, this book takes readers step by step through the process of creating histograms, boxplots, strip charts, time series graphs, steam-and-leaf displays, scatterplot matrices, and map graphs. ...
Loop-shaping Robust Control
Loop-shaping Robust Control

The loop-shaping approach consists of obtaining a specification in relation to the open loop of the control from specifications regarding various closed loop transfers, because it is easier to work on a single transfer (in addition to the open loop) than on a multitude of transfers (various loopings such as set point/error, disturbance / error, disturbance / control, etc.). The simplicity and flexibility of the approach make it very well adapted to the industrial context. This book presents the loop-shaping approach in its entirety, starting with the declension of high-level specifications into a loop-shaping specification. It then shows how it is possible to fully integrate this approach for the calculation of robust and efficient correctors with the help of existing techniques, which have already been industrially tried and tested, such as H-infinity synthesis. ...
Windows 8 Tweaks
Windows 8 Tweaks

From a Microsoft MVP, who is also the savvy creator of Tweaks.com, comes this ultimate collection of Windows 8 workarounds. Steve Sinchak takes you way beyond default system settings, deep under the hood of Windows 8, down to the hidden gems that let you customize your Windows 8 system like you wouldn't believe. From helping you customize the appearance to setting up home networking, sharing media, and squeezing every ounce of performance out of the OS, this book delivers. Get ready to rock and roll with Windows 8! ...
Mastering Unix Shell Scripting, 2nd Edition
Mastering Unix Shell Scripting, 2nd Edition

UNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting solution. Covering Bash, Bourne, and Korn shell scripting, this updated edition provides complete shell scripts plus detailed descriptions of each part. UNIX programmers and system administrators can tailor these to build tools that monitor for specific system events and situations, building solid UNIX shell scripting skills to solve real-world system administration problems. ...
Computer Assisted Exercises and Training
Computer Assisted Exercises and Training

Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large civilian organizations that are looking to teach and test their strategies and procedures without the added cost of manpower. Computer Assisted Exercises and Training: A Reference Guide is indispensable reading for research engineers, computer scientists, software engineers working with modeling and simulation, homeland security specialists, staff in simulation training centers, military strategists and commanders, and many others. It also serves as a valuable textbook for modeling and simulation courses at the upper-undergraduate and graduate levels. ...
Constraint Networks
Constraint Networks

A major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research and work in this area, divided into four main topics: representation, inference, search, and learning. The results obtained and reproduced in this book have a wide applicability, regardless of the nature of the problem or the constraints involved, making it an extremely user-friendly resource for those involved in this field. ...
Concepts of Combinatorial Optimization, Volume 1
Concepts of Combinatorial Optimization, Volume 1

Combinatorial optimization is a multidisciplinary scientific area, lying in the interface of three major scientific domains: mathematics, theoretical computer science and management. The three volumes of the Combinatorial Optimization series aims to cover a wide range of topics in this area. These topics also deal with fundamental notions and approaches as with several classical applications of combinatorial optimization. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026