This popular book shows students how to increase their power to analyze problems and comprehend what they read using the Think Aloud Pair Problem Solving [TAPPS] method. First it outlines and illustrates the method that good problem solvers use in attacking complex ideas. Then it provides practice in applying this method to a variety of...
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...
This book was written to arm engineers qualified and knowledgeable in the area of VLSI circuits with the essential knowledge they need to get into this exciting field and to help those already in it achieve a higher level of proficiency. Few people truly understand how a large chip is developed, but an understanding of the whole process is...
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.
The Journey from Manager to Leader: A Playbook for Success approaches successful leadership from a unique angle: storytelling and sports metaphors. Author William Jones illustrates insightful new pathways to winning in the business world. This book hits a home run for managers, attacking real world scenarios with practical advice from...
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.
In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of...
Data uncertainty is a concept closely related with most real life applications that involve data collection and interpretation. Examples can be found in data acquired with biomedical instruments or other experimental techniques. Integration of robust optimization in the existing data mining techniques aim to create new algorithms resilient to...
In "Faith", the theologian Theo Hobson explores the notion of faith and the role it plays in our lives. He unpacks the concept to ask whether faith is dependent on religion or whether it is also a general secular phenomenon. In exploring this question Hobson ranges widely over theology, philosophy, politics and psychology and...
Just today, a stranger came to my door claiming he was here to unclog a bathroom drain. I let him into my house without verifying his identity, and not only did he repair the drain, he also took off his shoes so he wouldn’t track mud on my floors. When he was done, I gave him a piece of paper that asked my bank to give him some money....
Unreal Development Kit (UDK) is a free but powerful game engine - ideal for hobbyists - and this tutorial is all you need to get started. Includes a walkthrough in building your own tower defense game.
Overview
Learn how to greybox your level by building basic shapes and reshaping the environment
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes
Key Features
Know how to set up your lab with Kali Linux
Discover the core concepts of web penetration testing
Real World SQL Server Administration with Perl is written with the goal of super-charging your SQL Server administration skills with Perl scripting, taking you to the next level of SQL Server administration. Through a broad range of scenarios, this book shows you how to write Perl scripts (often in combination with T-SQL scripting)...