Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Plant and Human Health, Volume 3: Pharmacology and Therapeutic Uses
Plant and Human Health, Volume 3: Pharmacology and Therapeutic Uses

Early anthropological evidence for plant use as medicine is 60,000 years old as reported from the Neanderthal grave in Iraq. The importance of plants as medicine is further supported by archeological evidence from Asia and the Middle East. Today, around 1.4 billion people in South Asia alone have no access to modern health care, and...

Bioinformatics with Python Cookbook: Learn how to use modern Python bioinformatics libraries and applications to do cutting-edge research in computational biology, 2nd Edition
Bioinformatics with Python Cookbook: Learn how to use modern Python bioinformatics libraries and applications to do cutting-edge research in computational biology, 2nd Edition

Discover modern, next-generation sequencing libraries from Python ecosystem to analyze large amounts of biological data

Key Features

  • Perform complex bioinformatics analysis using the most important Python libraries and applications
  • Implement next-generation sequencing,...
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions presents an accessible treatment of the two main components of support vector machines (SVMs)―classification problems and regression problems. The book emphasizes the close connection between optimization theory and SVMs since optimization is...

Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

Advances in Nucleic Acid Therapeutics (Drug Discovery (Volume 68))
Advances in Nucleic Acid Therapeutics (Drug Discovery (Volume 68))
The sequencing of the human genome and subsequent elucidation of the molecular pathways that are important in the pathology of disease have provided unprecedented opportunities for the development of new therapeutics. Nucleic acid-based drugs have emerged in recent years to yield extremely promising candidates for drug therapy to a wide...
Data Mining: A Knowledge Discovery Approach
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First, “long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...
Knowledge Discovery, Knowledge Engineering and Knowledge Management: 8th International Joint Conference, IC3K 2016, Porto, Portugal, November 9–11, ... in Computer and Information Science)
Knowledge Discovery, Knowledge Engineering and Knowledge Management: 8th International Joint Conference, IC3K 2016, Porto, Portugal, November 9–11, ... in Computer and Information Science)
This book constitutes the thoroughly refereed proceedings of the 8th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2016, held in Porto, Portugal, in November 2016.

The 18 full papers presented were carefully reviewed and selected from 186 submissions. The papers are...

Becoming a Values-Based Leader
Becoming a Values-Based Leader

What is Values-Based Leadership? How does one become a Values-Based Leader? Why Value-Based Leadership? Certainly these are critical questions. It is now widely recognized that effective leaders, from Martin Luther King through political leaders and corporate executives, have a foundation of values that guide their decision-making, and...

Quantum Strangeness: Wrestling with Bell's Theorem and the Ultimate Nature of Reality (The MIT Press)
Quantum Strangeness: Wrestling with Bell's Theorem and the Ultimate Nature of Reality (The MIT Press)
A physicist's efforts to understand the enigma that is quantum mechanics.

Quantum mechanics is one of the glories of our age. The theory lies at the heart of modern society. Quantum mechanics is one of our most valuable forecasters—a “great predictor.” It has immeasurably altered our conception of the...

Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Result Page: 60 59 58 57 56 55 54 53 52 51 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy