|
|
|
|
|
|
Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... | | Programming Perl (3rd Edition)Perl is a powerful interpreted programming language that has matured steadily since it first appeared in 1988. The first edition of this book, Programming Perl, hit the shelves in 1990, and was quickly adopted as the undisputed Bible of the language. Since then, Perl has grown with the times, and so has this book. Programming... | | Beginning C for Arduino, Second Edition: Learn C Programming for the Arduino
Beginning C for Arduino, Second Edition is written for those who have no prior experience with microcontrollers or programming but would like to experiment and learn both. Updated with new projects and new boards, this book introduces you to the C programming language, reinforcing each programming structure with a simple... |
|
Biomimetics: Biologically Inspired TechnologiesImagine a smart microchip that is buried in the ground for a long time. Upon certain triggering conditions this chip begins to grow and consume materials from its surroundings, converting them into energy and structural cells. As the chip grows further, it reconfigures its shape to become a mobile robot. Using its recently created mobility, the... | | | | |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |