Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Lean Sigma: A Practitioner's Guide
Lean Sigma: A Practitioner's Guide

Lean Sigma delivers resultsif you use the right tools and techniques. In Lean Sigma: A Practitioner's Guide, Dr. Ian Wedgwood captures best-practice Lean Sigma experience from multiple projects and industries, helping any professional identify the solution that...

Data Mining and Medical Knowledge Management: Cases and Applications (Premier Reference Source)
Data Mining and Medical Knowledge Management: Cases and Applications (Premier Reference Source)
The healthcare industry produces a constant flow of data, creating a need for deep analysis of databases through data mining tools and techniques resulting in expanded medical research, diagnosis, and treatment.

Data Mining and Medical Knowledge Management: Cases and Applications presents case studies on applications of various...

Essentials of Programming Languages, 3rd Edition
Essentials of Programming Languages, 3rd Edition

This book brings you face-to-face with the most fundamental idea in computer programming:

The interpreter for a computer language is just another program. It sounds obvious, doesn’t it? But the implications are profound. If you are a computational theorist, the interpreter idea recalls Gödel’s discovery of
...

Handbook of Research on Computational Methodologies in Gene Regulatory Networks (Handbook of Research On...)
Handbook of Research on Computational Methodologies in Gene Regulatory Networks (Handbook of Research On...)
Recent advances in gene sequencing technology are now shedding light on the complex interplay between genes that elicit phenotypic behavior characteristic of any given organism. In order to mediate internal and external signals, the daunting task of classifying an organisms genes into complex signaling pathways needs to be completed. The...
Targeted Therapies in Cancer: Myth or Reality? (Advances in Experimental Medicine and Biology)
Targeted Therapies in Cancer: Myth or Reality? (Advances in Experimental Medicine and Biology)
Cancers share a restricted set of characteristics crucial to the tumor phenotype: proliferation in the absence of external growth stimuli, avoidance of apoptosis and no limits to replication, escape from external growth-suppressive forces and the immune response, an inflammatory micro-environment with new blood vessel...
The Ten Lost Tribes: A World History
The Ten Lost Tribes: A World History

The legendary story of the ten lost tribes of Israel has resonated among both Jews and Christians down through the centuries: the compelling idea that some core group of humanity was "lost" and exiled to a secret place, perhaps someday to return triumphant. In this fascinating book, Zvi Ben-Dor Benite shows for the first time the...

Inductive Databases and Constraint-Based Data Mining
Inductive Databases and Constraint-Based Data Mining

This book is about inductive databases and constraint-based data mining, emerging research topics lying at the intersection of data mining and database research. The aim of the book as to provide an overview of the state-of- the art in this novel and exciting research area. Of special interest are the recent methods for constraint-based...

Enzyme Engineering: Methods and Protocols (Methods in Molecular Biology)
Enzyme Engineering: Methods and Protocols (Methods in Molecular Biology)

Whether the pursuit is commercially motivated or purely academic, engineering a novel biological catalyst is an enticing challenge. High-resolution protein structure analysis allows for rational alteration of enzyme function, yet many useful enzyme variants are the product of well-designed selection schemes or screening strategies. Enzyme...

More iOS 6 Development: Further Explorations of the iOS SDK
More iOS 6 Development: Further Explorations of the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you’re a self-taught iPhone and iPad apps development genius or have just made your way through the pages of Beginning iOS 6 Development, we have the perfect book for you.

More iOS 6 Development: Further Explorations of the...

The Nothing That Is: A Natural History of Zero
The Nothing That Is: A Natural History of Zero
A symbol for what is not there, an emptiness that increases any number it's added to, an inexhaustible and indispensable paradox. As we enter the year 2000, zero is once again making its presence felt. Nothing itself, it makes possible a myriad of calculations. Indeed, without zero mathematics as we know it would not exist. And without mathematics...
Architects Sketches: Dialogue and Design
Architects Sketches: Dialogue and Design
An in-depth study of the methods, meaning and intentions of architects' sketches through time

Concepts from architects minds evolve through sketches and as a mode of transference are conveyed to the finished building. This book compares qualities of sketches to reveal unique approaches to the instruments of thinking in which all
...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy