Home | Amazing | Today | Tags | Publishers | Years | Search 
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

Netcentric System of Systems Engineering with DEVS Unified Process
Netcentric System of Systems Engineering with DEVS Unified Process

Addressing the new challenges that engineers face, this book presents fundamental concepts to help tackle the integration of modeling and simulation with command, and control systems of systems through the use of concepts and standards for interoperability and testing based on the Discrete Event Systems Specification Unified Process. The text...

Arctic Security in an Age of Climate Change
Arctic Security in an Age of Climate Change

This is the first book to examine Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway, and the United States, as well as Iceland, Sweden, and Finland, are grappling with an emerging Arctic...

Getting a Big Data Job For Dummies
Getting a Big Data Job For Dummies

Hone your analytic talents and become part of the next big thing

Getting a Big Data Job For Dummies is the ultimate guide to landing a position in one of the fastest-growing fields in the modern economy. Learn exactly what "big data" means, why it's so important across all industries, and how you can...

CAD, 3D Modeling, Engineering Analysis, and Prototype Experimentation: Industrial and Research Applications
CAD, 3D Modeling, Engineering Analysis, and Prototype Experimentation: Industrial and Research Applications

This succinct book focuses on computer aided design (CAD), 3-D modeling, and engineering analysis and the ways they can be applied effectively in research and industrial sectors including aerospace, defense, automotive, and consumer products. These efficient tools, deployed for R&D in the laboratory and the field, perform efficiently...

Introduction to Forensic DNA Evidence for Criminal Justice Professionals
Introduction to Forensic DNA Evidence for Criminal Justice Professionals

The use of DNA profiling in forensic cases has been considered the most innovative technique in forensic science since fingerprinting, yet for those with limited scientific knowledge, understanding DNA enough to utilize it properly can be a daunting task. Introduction to Forensic DNA Evidence for Criminal Justice Professionals is...

Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware...

Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

The Complement System: Novel Roles in Health and Disease
The Complement System: Novel Roles in Health and Disease

As a phylogenetically old system complement is now regarded as a part of innate immunity. But it is much more than that. It bridges innate and adapted immunity, participates not only in host defense but also in many essential physiological processes, old and new diseases and adverse conditions. Indeed, complement became a term that almost...

Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
In the second half of the 20th century innate immune responses of cellular or humoral type were treated like stepchildren by many immunologists: that is, somewhat neglected. This disregard turned into an exciting research field over the past several years and led to the identification of receptor families involved in the recognition...
Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy