Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Diabetes Technology
Handbook of Diabetes Technology

This book covers the main fields of diabetes management through applied technologies.

The different chapters include insulin therapy through basic insulin injection therapy, external and implantable insulin pumps and the more recent approaches such as sensor augmented pumps and close-loop systems. Islet transplantation...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript

Learn how to write cross platform React Native code by using effective design patterns in the JavaScript world. Get to know industry standard patterns as well as situational patterns. Decouple your application with these set of “Idea patterns”.

Key Features

  • Mobile development...
Essential PHP Security
Essential PHP Security

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in...

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

SQL Antipatterns: Avoiding the Pitfalls of Database Programming
SQL Antipatterns: Avoiding the Pitfalls of Database Programming

Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the anti?patterns in terms of logical database design, physical database design, queries, and application development.

The chances are good that your application's database
...

It's True! You Eat Poison Every Day
It's True! You Eat Poison Every Day
My dentist said, ‘I’ve just given you a lethal injection.’

He explained that the novocaine he’d just injected into my jaw was fatal – or would be if it went into a vein. Where it was, in the muscle, the injection was safe.

In researching this book, I discovered that poisons are used as beauty aids
...
Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

Pounder's Marine Diesel Engines and Gas Turbines, Ninth Edition
Pounder's Marine Diesel Engines and Gas Turbines, Ninth Edition
Since its first appearance in 1950, Pounder's Marine Diesel Engines has served seagoing engineers, students of the Certificates of Competency examinations and the marine engineering industry throughout the world. Each new edition has noted the changes in engine design and the influence of new technology and economic needs on the marine...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy