Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Application Obfuscation
Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...

Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face.

Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to...

Real World XML, Second Edition
Real World XML, Second Edition

Steven Holzner's friendly, easy-to-read style has turned this book (formerly known as Inside XML) into the leading reference on XML. Unlike other XML books, this one is packed with hundreds of real-world examples, fully tested and ready to use!

Holzner teaches you XML like no other author can, covering...

Nutrition and Wound Healing (Modern Nutrition Science)
Nutrition and Wound Healing (Modern Nutrition Science)

With mounting evidence regarding the role of poor nutrition in the development of chronic diseases such as heart disease and diabetes, it is no secret that appropriate nutrition is crucial to optimal health. Achieving the correct balance of elements provides the body with the ability to adapt to a shifting and often hazardous environment....

Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
WRITTEN BY A LAW ENFORCEMENT PROFESSIONAL FOR OTHER LAW ENFORCEMENT PERSONNEL IN THE TRENCHES This book examines the workings of organized criminals and criminal groups that transcend national boundaries. Discussions include methods used by criminal groups to internationally launder money; law enforcement efforts to counteract such schemes; and...
Negative Refraction Metamaterials: Fundamental Principles and Applications
Negative Refraction Metamaterials: Fundamental Principles and Applications
Learn about the revolutionary new technology of negative-refraction metamaterials

Negative-Refraction Metamaterials: Fundamental Principles and Applications introduces artificial materials that support the unusual electromagnetic property of negative refraction. Readers will discover several classes of negative-refraction materials along with...

Medical Malpractice: A Physician's Sourcebook
Medical Malpractice: A Physician's Sourcebook

Books such as this one are deceptively difficult to create. The general subject is neither happy, nor easy, nor most anyone’s idea of fun. M- practice litigation, however, has become a central fact of existence in the practice of medicine today. This tsunami of lawsuits has led to a high volume of irreconcilable rhetoric and ultimately...

UML Demystified
UML Demystified
There’s no easier, faster, or more practical way to learn the really tough subjects

UML Demystified explains how to read, model, and use UML to create well-structured, stable software products. This self-teaching guide comes complete with key points, background information, quizzes at the end of each chapter,...

Laser Space Communications
Laser Space Communications

Laser space communications is a hot topic among electrical engineers working for the government and in the defense industry, and this groundbreaking resource is the first to offer professionals a thorough, practical treatment of the subject. The book focuses on the feasibility of laser space communications between satellites, satellites and...

Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)
Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)

A man is accused of attempted murder of a former crystal meth addict. He claims he shot in self-defense, responding to the extremely aggressive behavior the victim was exhibiting. How will this play out in court? Most likely, the prosecution and the defense will call various expert witnesses - perhaps neurologists, psychologists, pathologists...

Professional Windows Desktop and Server Hardening (Programmer to Programmer)
Professional Windows Desktop and Server Hardening (Programmer to Programmer)

Although not well known, Microsoft Windows has the best security of any popular operating system in the world today. What Windows has is poor default security. There are specific steps any professional can take to significantly increase the security of Microsoft Windows. Unfortunately, most books and the news media keep reinforcing the failed,...

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy