Pages : | 570 pages |
Size : | PDF (545 pages, 7.7 MB) |
File type : | |
Downloads: | 11 |
Created: | 2020-08-27 |
License: | Cisco-style Mozilla Public License |
Author(s): | Antoni Niederlinski |
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be c..., download free Secure Systems tutorial in PDF (558 pages) created by Piotr Lewandowski ....
Building the Infrastructure for Cloud SecurityFor cloud users and providers alike, security is an everyday concern, yet there are very f..., download free Cloud Security tutorial in PDF (244 pages) created by Raghuram Yeluri ....
Signal Computing: Digital Signals in the Software DomainThis book teaches students how digital signals are captured, represented, processed, communicated, and stored in computers. building on the exceptionally readable coverage that made it the favorite of DSP professionals worldwide. ...
Computing Fundamentals: The Theory and Practice of Software Design with BlackBox Component Builder...
Cryptography and Network securityDownload Cryptography and network security PDF tutorial by Chandraskhar Rao intended to Bachelor of Technology in Computer Science and Engineering....
GNU SEDThe book heavily leans on examples to present features of sed as well as regular expressio..., download free GNU SED tutorial in PDF (100 pages) created by ....
Certified Programming with Dependent TypesThe technology of mechanized program verification can play a supporting role in many kinds..., download free Certified Programming tutorial in PDF (368 pages) created by Adam Chlipala ....
On the Path to AI: Conceptual Foundations of the Machine Learning AgeThis book explores machine learning and its impact on how we make sense of the world. It does so by bringing together two 'revolutions' in a surprising analogy: the revolution of machine learning, which has placed computing on the path to artificial intelligence, and the revolution in thinking about...
New Frontiers in Graph TheoryNowadays, graph theory is an important analysis tool in mathematics and computer science. Because of the inherent simplicity of graph theory, it can be used to model many different physical and abstract systems such as transportation and communication networks, models for business administration, po...
Mining Social MediaDownload free course Mining Social Media, pdf file on 208 pages by Lam Thuy Vo....