Home | Amazing | Today | Tags | Publishers | Years | Search 
Manual of Neurologic Therapeutics Seventh Edition
Manual of Neurologic Therapeutics Seventh Edition
Once the last bastion of therapeutic nihilism, neurology has now clearly entered the era of intense therapy for virtually every class of disease that affects the nervous system. Consequently, the modern neurology department is now subdivided into a dozen clinical subspecialties, each with its own group of experts, often...
Computer Models in Biomechanics: From Nano to Macro
Computer Models in Biomechanics: From Nano to Macro

This book contains a collection of papers that were presented at the IUTAM Symposium

on “Computer Models in Biomechanics: From Nano to Macro” held at Stanford University, California, USA, from August 29 to September 2, 2011.

It contains state-of-the-art papers on:

- Protein and Cell...

Creating a Data-Driven Organization
Creating a Data-Driven Organization

What do you need to become a data-driven organization? Far more than having big data or a crack team of unicorn data scientists, it requires establishing an effective, deeply-ingrained data culture. This practical book shows you how true data-drivenness involves processes that require genuine buy-in across your company, from analysts...

Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

About This Book

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step,...
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design

Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer...

Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805: A Comprehensive OCPJP 7 Certification Guide (Expert's Voice in Java)
Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805: A Comprehensive OCPJP 7 Certification Guide (Expert's Voice in Java)

Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805 is a concise, comprehensive, step-by-step, and one-stop guide for the Oracle Certified Professional Java SE 7 Programmer Exam. The first two chapters set the stage for exam preparation and let the reader get started quickly. The first chapter answers...

Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform

Are you facing a challenging Salesforce.com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? Practical Salesforce.com Development...

Green Electronics Manufacturing: Creating Environmental Sensible Products
Green Electronics Manufacturing: Creating Environmental Sensible Products

Going "green" is becoming a major component of the mission for electronics manufacturers worldwide. While this goal seems simplistic, it poses daunting dilemmas. Yet, to compete effectively in the global economy, manufacturers must take the initiative to drive this crucial movement. Green Electronics Manufacturing: Creating...

Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

BackTrack 5 Cookbook
BackTrack 5 Cookbook

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed...
Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries
Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries

“Dr. Seethaler has written an excellent book for any interested student of science. She answers great questions about the world around us in this fascinating book. As a high school science teacher, I encounter many of these from my own students. I would highly recommend this book for anyone who has pondered...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy