Home | Amazing | Today | Tags | Publishers | Years | Search 
The Angry Chef: Bad Science and the Truth About Healthy Eating
The Angry Chef: Bad Science and the Truth About Healthy Eating

"The popular understanding of nutrition is clouded by superstitions, primitive intuitions, conspiracy theories, and old wives' tales. This irreverent and intelligent expose brings sanity and good sense to one of life's great pleasures." ―Steven Pinker, author of Angels of Our Better Nature

...

Adhesion in Microelectronics (Adhesion and Adhesives: Fundamental and Applied Aspects)
Adhesion in Microelectronics (Adhesion and Adhesives: Fundamental and Applied Aspects)

This comprehensive book will provide both fundamental and applied aspects of adhesion pertaining to microelectronics in a single and easily accessible source. Among the topics to be covered include;

  • Various theories or mechanisms of adhesion
  • Surface (physical or chemical) characterization of materials as it...
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
"One stop shopping for J2EE."
– Scott Ambler, Senior Consultant, Ronin International, Inc. and Author of Agile Modeling

If Java 2 Enterprise Edition 1.4 can do it, you can do it too...

You already know that Java 2 Enterprise Edition 1.4 makes your enterprise services more cost-effective, more adaptable,...

Maximum Mac OS X Security
Maximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally...

Hacking GPS (ExtremeTech)
Hacking GPS (ExtremeTech)
You'll get lost in this book, but nowhere else

Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...

Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Its power and short learning curve have made Access Microsoft’s leading consumer relational database management system for desktop applications. VBA lets you tap more of that power, responding to application level events, displaying forms and reports, manipulating toolbars, and much more.

In this book, a crack team of programmers...

Reality ColdFusion MX: Flash MX Integration
Reality ColdFusion MX: Flash MX Integration

Come be part of a real-world development team, from the start of a project to the finish! In Reality ColdFusion MX: Flash MX Integration, you get to experience how the power of ColdFusion can help drive the Flash experience by designing Web applications, discussing development issues, finding solutions, and implementating the final products....

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy