Uncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...
Lean Sigma delivers resultsif you use the right tools and techniques. In Lean Sigma: A Practitioner's Guide, Dr. Ian Wedgwood captures best-practice Lean Sigma experience from multiple projects and industries, helping any professional identify the solution that...
The healthcare industry produces a constant flow of data, creating a need for deep analysis of databases through data mining tools and techniques resulting in expanded medical research, diagnosis, and treatment.
Data Mining and Medical Knowledge Management: Cases and Applications presents case studies on applications of various...
This book brings you face-to-face with the most fundamental idea in computer programming:
The interpreter for a computer language is just another program. It sounds obvious, doesn’t it? But the implications are profound. If you are a computational theorist, the interpreter idea recalls Gödel’s discovery of...
Recent advances in gene sequencing technology are now shedding light on the complex interplay between genes that elicit phenotypic behavior characteristic of any given organism. In order to mediate internal and external signals, the daunting task of classifying an organisms genes into complex signaling pathways needs to be completed. The...
Cancers share a restricted set of characteristics crucial to the tumor phenotype:
proliferation in the absence of external growth stimuli, avoidance of apoptosis and
no limits to replication, escape from external growth-suppressive forces and the
immune response, an inflammatory micro-environment with new blood vessel...
The legendary story of the ten lost tribes of Israel has resonated among both Jews and Christians down through the centuries: the compelling idea that some core group of humanity was "lost" and exiled to a secret place, perhaps someday to return triumphant. In this fascinating book, Zvi Ben-Dor Benite shows for the first time the...
This book is about inductive databases and constraint-based data mining, emerging
research topics lying at the intersection of data mining and database research. The
aim of the book as to provide an overview of the state-of- the art in this novel and exciting
research area. Of special interest are the recent methods for constraint-based...
Whether the pursuit is commercially motivated or purely academic, engineering a novel biological catalyst is an enticing challenge. High-resolution protein structure analysis allows for rational alteration of enzyme function, yet many useful enzyme variants are the product of well-designed selection schemes or screening strategies. Enzyme...
Interested in iPhone and iPad apps development? Want to learn more? Whether you’re a self-taught iPhone and iPad apps development genius or have just made your way through the pages of Beginning iOS 6 Development, we have the perfect book for you.
More iOS 6 Development: Further Explorations of the...
A symbol for what is not there, an emptiness that increases any number it's added to, an inexhaustible and indispensable paradox. As we enter the year 2000, zero is once again making its presence felt. Nothing itself, it makes possible a myriad of calculations. Indeed, without zero mathematics as we know it would not exist. And without mathematics...
An in-depth study of the methods, meaning and intentions of architects' sketches through time
Concepts from architects minds evolve through sketches and as a mode of transference are conveyed to the finished building. This book compares qualities of sketches to reveal unique approaches to the instruments of thinking in which all...