Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so...

A Fiduciary Approach to Delegated and Implementing Rule-Making in the EU: How to Trust the Commission
A Fiduciary Approach to Delegated and Implementing Rule-Making in the EU: How to Trust the Commission

This book focuses on the evaluation of delegated and implementing rule-making, based on Articles 290 and 291 TFEU. These articles have attracted considerable attention since their introduction in 2009, and their implementation is one of the most hotly debated questions in European Administrative Law. The book takes up this...

Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Food Safety
Food Safety
It is estimated that 20 percent of all emergency room visits are due to foodborne illness. As dietary habits change to include more meals prepared away from home, higher consumption of fresh foods, and more imported foods, the risks of foodborne illness change. Food safety procedures that we learned from our parents may not be sufficient to keep us...
Essentials of Telemedicine and Telecare
Essentials of Telemedicine and Telecare

Rapid advancement of telecommunications and information technology has created the potential for high-quality expert healthcare to be delivered when and where it is needed. This text charts the development of the telemedicine industry, defines its current scope and reveals the potential of new methodologies.

* Explains the main...

The Essential Family Guide to Caring for Older People
The Essential Family Guide to Caring for Older People

No one wants to think about getting older. It's true. At any age, when things are moving along normally day to day and everyone seems fit and well, there seems no reason to think about future problems that your friends and relatives might (and probably will) come across as they age. In fact, it might even seem a little morbid to...

Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Disinfection and Decontamination: Principles, Applications and Related Issues
Disinfection and Decontamination: Principles, Applications and Related Issues

In the battle between humans and microbes, knowledge may be not only the best weapon but also the best defense. Pulling contributions from 34 experts into a unified presentation, Disinfection and Decontamination: Principles, Applications, and Related Issues provides coverage that is both sophisticated and practical. The book reviews...

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Practical Web Scraping for Data Science: Best Practices and Examples with Python
Practical Web Scraping for Data Science: Best Practices and Examples with Python

This book provides a complete and modern guide to web scraping, using Python as the programming language, without glossing over important details or best practices. Written with a data science audience in mind, the book explores both scraping and the larger context of web technologies in which it operates, to ensure full...

Stolen Women in Medieval England: Rape, Abduction, and Adultery, 1100-1500
Stolen Women in Medieval England: Rape, Abduction, and Adultery, 1100-1500

This study of illicit sexuality in medieval England explores links between marriage and sex, law and disorder, and property and power. Some medieval Englishwomen endured rape or were kidnapped for forced marriages, yet most ravished women were married and many 'wife-thefts' were not forced kidnappings but cases of adultery...

Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck...

Result Page: 51 50 49 48 47 46 45 44 43 42 41 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy