Home | Amazing | Today | Tags | Publishers | Years | Search 
Interferon: The 50th Anniversary (Current Topics in Microbiology and Immunology)
Interferon: The 50th Anniversary (Current Topics in Microbiology and Immunology)

A vital text for researchers and clinicians in the fields of virology and oncology alike, this book is a comprehensive guide to one of medicine’s most important tools that covers the most recent research. Important insights have been made in recent months that are challenging the accepted concept of the critical role of dsRNA in IFN...

Cube Farm
Cube Farm

Truth is often stranger than fiction, especially when it comes to the workplace. In Cube Farm, author Bill Blunden recounts his three years in Minnesota performing research and development for Lawson Software. Riddled with intrigue, duplicity and collusion, this story offers a trench-level view of a company in the...

Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)

The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...

Systems of Systems
Systems of Systems

In recent years, the systems designed to support activity in the fields of banking, health, transportation, space, aeronautics, defense, etc. have become increasingly larger and more complex. With the growing maturity of information and communication technologies, systems have been interconnected within growing networks, yielding new...

CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

Bacterial Resistance to Antimicrobials
Bacterial Resistance to Antimicrobials

Focuses on combating bacterial pathogens by understanding their strategies of defense!

Each chapter begins with a summary of concepts, so those not actively working in the field gain an overall picture of what follows!

Highlights antibiotic resistance in pathogens that poses the greatest threat to human
...

Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Web Application Defender's Cookbook: Battling Hackers and Protecting Users

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you...

Imbalanced Learning: Foundations, Algorithms, and Applications
Imbalanced Learning: Foundations, Algorithms, and Applications

The first book of its kind to review the current status and future direction of the exciting new branch of machine learning/data mining called imbalanced learning

Imbalanced learning focuses on how an intelligent system can learn when it is provided with imbalanced data. Solving imbalanced learning problems is critical in...

Molecular Plant Immunity
Molecular Plant Immunity

Molecular Plant Immunity provides an integrated look at both well-established and emerging concepts in plant disease resistance providing the most current information on this important vitally important topic within plant biology. Understanding the molecular basis of the plant immune system has implications on the development of new...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Game Programming Algorithms and Techniques: A Platform-Agnostic Approach (Game Design/Usability)
Game Programming Algorithms and Techniques: A Platform-Agnostic Approach (Game Design/Usability)

Game Programming Algorithms and Techniques is a detailed overview of many of the important algorithms and techniques used in video game programming today. Designed for programmers who are familiar with object-oriented programming and basic data structures, this book focuses on practical concepts that see actual use in the...

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy