Analyzing Computer

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach (repost)

Charles P. Pfleeger, Shari Lawrence Pfleeger, "Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach"
2011 | ISBN: 0132789469 | scanned PDF | 848 pages | 239 MB

Analyzing Computer Systems Performance: With Perl: PDQ by Neil J. Gunther [Repost]  eBooks & eLearning

Posted by tanas.olesya at Feb. 2, 2015
Analyzing Computer Systems Performance: With Perl: PDQ by Neil J. Gunther [Repost]

Analyzing Computer Systems Performance: With Perl: PDQ by Neil J. Gunther
English | June 28, 2005 | ISBN: 3540208658 | 457 Pages | PDF | 6 MB

Makes performance analysis and queueing theory concepts simple to understand and available to anyone with a background in high school algebra

Analyzing Computer System Performance with Perl::PDQ, 2nd edition  eBooks & eLearning

Posted by advisors at March 26, 2013
Analyzing Computer System Performance with Perl::PDQ, 2nd edition

Analyzing Computer System Performance with Perl::PDQ, 2nd edition By Neil J. Gunther
2011 | 502 Pages | ISBN: 3642225829 | PDF | 16 MB

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach  eBooks & eLearning

Posted by bookwyrm at Nov. 8, 2012
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach By Charles P. Pfleeger, Shari Lawrence Pfleeger
2011 | 848 Pages | ISBN: 0132789469 | scanned PDF | 239 MB

Neil J. Gunther, «Analyzing Computer Systems Performance: With Perl::PDQ»  eBooks & eLearning

Posted by Spymaker at Nov. 1, 2006
Neil J. Gunther, «Analyzing Computer Systems Performance: With Perl::PDQ»

Neil J. Gunther, «Analyzing Computer Systems Performance: With Perl::PDQ»
Publisher: Springer | June 2005 | ISBN: 3540208658 | 436 Pages | Format: PDF | Size: 3,5 MB

Formal Models and Techniques for Analyzing Security Protocols  eBooks & eLearning

Posted by roxul at Nov. 6, 2016
Formal Models and Techniques for Analyzing Security Protocols

V. Cortier, S. Kremer, "Formal Models and Techniques for Analyzing Security Protocols"
English | ISBN: 1607507137 | 2011 | 312 pages | PDF | 2 MB

Guide to Computer Forensics and Investigations (5th Revised edition)  eBooks & eLearning

Posted by happy4all at Oct. 19, 2016
Guide to Computer Forensics and Investigations (5th Revised edition)

Guide to Computer Forensics and Investigations (5th Revised edition) By Bill Nelson
2016 | 752 Pages | ISBN: 1285060032 | PDF + ISO | 25 MB + 4.4 GB
Multisensor Instrumentation 6σ Design: Defined Accuracy Computer-Integrated Measurement Systems (Repost)

Patrick H. Garrett, "Multisensor Instrumentation 6σ Design: Defined Accuracy Computer-Integrated Measurement Systems"
2002 | pages: 225 | ISBN: 0471205060 | PDF | 1,6 mb
Programming Computer Vision with Python: Tools and algorithms for analyzing images (Repost)

Programming Computer Vision with Python: Tools and algorithms for analyzing images By Jan Erik Solem
2012 | 272 Pages | ISBN: 1449316549 | EPUB | 9 MB

If you want a basic understanding of computer vision’s underlying theory and algorithms, this hands-on introduction is the ideal place to start.
Programming Computer Vision with Python: Tools and algorithms for analyzing images (repost)

Jan Erik Solem "Programming Computer Vision with Python: Tools and algorithms for analyzing images"
Publisher: O'Reilly Media | English | 2012 | ISBN: 1449316549 | 264 pages | PDF | 68.8 MB