|
|
|
|
|
The Algorithm Design ManualMost of the professional programmers that I've encountered are not well prepared to tackle algorithm design problems. This is a pity, because the techniques of algorithm design form one of the core practical technologies of computer science. Designing correct, efficient, and implementable algorithms for realworld problems is a tricky... | | | | Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were
involved in some of the fi rst penetration tests performed in the UK, where large organizations and
government departments allowed ethical hackers into their networks to determine the risk they
faced from what are now known as cyber attacks.... |
|
|
Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... | | Systems Bioinformatics: An Engineering Case-Based ApproachThe high-throughput nature of bioinformatics and system biology has made traditional biological methods, which tend to focus one or two molecules at a time, obsolete. It has made engineering and problem solving skills essential to attack the resulting complex, multiscale problems. Certain technologies, such as robotics automation, microfabrication,... | | |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 |