HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...
Get ready to explore all that Poser has to offer! Giving you a firm foundation, "Poser 6 Revealed: The Official Guide" allows you to master concepts on both a technical and artistic level. Begin by examining the concept behind each task—the goal and the necessary features that are involved. Then go in-depth with the objective of...
Molecular pathology is based on the emergence of new techniques that greatly enhance the diagnostic accuracy when facing with challenging differential diagnoses. In addition, new molecular techniques are entering the clinical arena for their value in predicting therapy response and tumor prognosis. This book provides a guide for the...
Object Oriented Simulation will qualify as a valuable resource to students and accomplished professionals and researchers alike, as it provides an extensive, yet comprehensible introduction to the basic principles of object-oriented modeling, design and implementation of simulation models.
In Scandinavian Colonialism and the Rise of Modernity: Small Time Agents in a Global Arena, archaeologists, anthropologists, and historians present case studies that focus on the scope and impact of Scandinavian colonial expansion in the North, Africa, Asia and America as well as within Scandinavia itsself. They discuss early...
The ultimate guide to WebKit from the world's most popular resource for web designers and developers
As the default browser for both iPhone and Android, WebKit has become a major player in the mobile arena, offering a wider array of HTML5 and CSS3 support than any other major engine. Written by expert author Jon Raasch,...
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.
Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code...
The examples used in this book are taken from my own experiences, as well as from
the experiences of those with or for whom I have had the pleasure of working. Of course,
for obvious legal and honorable reasons, the exact details and any information that
might reveal the identities of the other parties involved have been changed.
While the idea of cleverly using silicon–germanium (SiGe) and silicon (Si) strained-layer epitaxy to
practice bandgap engineering of semiconductor devices in the highly manufacturable Si material system
is an old one, only in the past decade has this concept become a practical reality. The final success of
creating novel Si...
This book analyses the foreign policy of Silvio Berlusconi, Italian media tycoon and politician who served as Prime Minister of Italy in four governments. The authors examine the Italian position in the international arena and its foreign policy tradition, as well as Berlusconi’s general political stance, Berlusconi’s...