Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SHARKS in the MOAT: How to Create Truly Secure Software
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Biology: The Dynamic Science
Biology: The Dynamic Science

Learn how to think and engage like a scientist! BIOLOGY: THE DYNAMIC SCIENCE, Second Edition, provides you with a deep understanding of the core concepts in Biology, building a strong foundation for additional study. In a fresh presentation, the authors explain complex ideas clearly and describe how biologists collect and interpret evidence...

Reactive Oxygen Metabolites: Chemistry and Medical Consequences
Reactive Oxygen Metabolites: Chemistry and Medical Consequences

In recent years, the field of radical chemistry has undergone explosive growth. Although its roots lie in organic chemistry, the implications of its findings are having enormous impact in a broad range of disciplines, and we now have evidence for radical involvement in over 100 diseases. As important as this is, however, the subject of...

Electrotherapeutic Devices: Principles, Design, and Applications
Electrotherapeutic Devices: Principles, Design, and Applications

Electrotherapy is fast gaining mainstream acceptance, no doubt due to the growing mountain of clinical evidence demonstrating its effectiveness. To meet the growing demand for information, this scientifically rigorous guide gives healthcare professionals and engineers essential technical, biological, and clinical background together with...

Macromedia FreeHand MX: Training from the Source
Macromedia FreeHand MX: Training from the Source
When faced with a design problem, it shouldn't be because you don't know how to use the design software. If you're learning Macromedia FreeHand MX for the first time, you can rely on Macromedia FreeHand MX: Training from the Sourcefor a thorough ground-up education that you can tackle at your own pace. This popular series from Macromedia Press...
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into...
Programming Languages and their Definition: Selected Papers (Lecture Notes in Computer Science) (v. 177)
Programming Languages and their Definition: Selected Papers (Lecture Notes in Computer Science) (v. 177)

The IBM Vienna Laboratory has made a significant contribution to the work on the semantic description of computer systems. Both the operational semantics descriptions ("VDL") and the later work on denotational semantics ("Meta-IV", "VEM") contain interesting scientific ideas. Partly because of the large...

Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Those not already deeply immersed in recondite Kennedy assassination lore will find this offering by Kroth-an associate professor of counseling psychology at Santa Clara University, and a contributor to CounterPunch, a biweekly "muckraking newsletter"-well over the top. Advertised as an "objective" look at the myriad conspiracy...
Mountain Resorts (Ecology and Law in Modern Society)
Mountain Resorts (Ecology and Law in Modern Society)
Mountains are the home of significant ecological resources - wildlife habitat, higher elevation plant systems, steep slopes and delicate soils, and water systems. These resources are subject to very visible and growing pressures, most of which are caused by the unique features of mountains. Using as case studies four mountain resorts in four ranges...
Pro JavaScript Design Patterns
Pro JavaScript Design Patterns

As a web developer, you’ll already know that JavaScript™ is a powerful language, allowing you to add an impressive array of dynamic functionality to otherwise static web sites. But there is more power waiting to be unlocked--JavaScript is capable of full object-oriented capabilities, and by applying OOP principles, best practices,...

Strategic Supply Chain Management
Strategic Supply Chain Management
"We have to get a handle on our supply chain."

These words have become a standard corner-office lament in today's no-room-for-error business arena. But even when companies address their most glaring supply chain challenges, they can still find that cost-effective and strategic supply chain management is hard to...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy