Test the sample chapter of a typical book
Hacker attack and defense Programming
The book hacker attack and defense practices programming is an improvement article in getting started with hacker attack and defense practices, detailed explanation of hacker attack and defense practices, and advanced hacker attack and defense practices, still, from the perspective of "Attacking" and "preventing" hackers, we will conduct research on the hot and difficult issues of security research at home and abroad, the content covers the development and research of Web intrusion scripts, viruses, Trojans, network horses, encryption and decryption, shellcode, vulnerability overflow penetration, vulnerability mining, and other related fields. This book is suitable for researchers, institutions, network administrators, and students interested in the network field for reference and teaching, it is also suitable for developers of anti-virus software, Trojan scan, and other related network security tools as a reference.
Wonderful sample chapter trial download: http://www.broadview.com.cn/08537
Introduction to enterprise-level virtual machine application practices
This book describes the most advanced enterprise-level Virtual Machine products, including VMWare VI/vsphere, Microsoft hyper-V R2, and Citrix xen. The book consists of 22 chapters, starting from the basic concepts of enterprise-level virtual machines, describing hardware design and purchase, topology principles, and the hardware most suitable for enterprise-level virtual machines, the topic is started after the storage device cooperation and TCO/ROI calculation. In the second half of this book, we will introduce the most common Virtual Machine instances based on the two mainstream products hyper-V/R2 and VMWare ESX/vsphere architectures.
Virtual machines are a new technology, especially enterprise-level virtual machines, which are unfamiliar to many IT personnel. However, virtual machine technology will be the design principle of enterprise IT environments in the future. After major manufacturers have successively launched mature products, from small personal studios to multinational enterprises with hundreds of thousands of people, we will begin to adopt virtual machine technology. Therefore, this book may be used as a reference for software and hardware personnel who want to understand virtual machines and master virtual machine technology in computer-related industries.
Wonderful sample chapter trial download: http://www.broadview.com.cn/08739
Introduction to proficient in MATLAB Image Processing
This book focuses on the application of the MATLAB Image Processing Toolbox after a brief introduction to the basic theory of image processing, it also provides a large number of instances and comprehensive practical applications.
This book consists of three parts: MATLAB entry, image processing improvement, and comprehensive practice. This section describes MATLAB software, basic operations, program design, and graphic drawing. image processing is an important part of image processing, this includes image operation, transformation, enhancement, analysis, restoration, morphological operations, and color image processing, describes the Application of MATLAB to analyze and solve specific image processing problems, including image reconstruction, enhancement, registration, de-blurring, segmentation and feature extraction, and other typical applications.
This book is concise, informative, and well-illustrated. It can be used by undergraduates majoring in signal and information processing, computer science and technology, communication engineering, geophysical and medical science, graduate students are used as auxiliary teaching materials and reference books for image processing, and can also be used for reference by corresponding engineering and technical personnel.
Wonderful sample chapter trial download: http://www.broadview.com.cn/08780