|
|
|
|
|
Non-viral Gene Therapy: Gene Design and Delivery
Several years ago, when the discovery of catalytic RNA was recognized in a public manner, many people asked if new ?elds of therapy would soon be available. Although some tentative positive answers were given, nobody would say with certainty that RNA of various kinds was a truly promising means of altering gene expression. In fact, over the... | | iPad Made Simple
Get the most out of your iPad with iPad Made Simple—learn all the key features, understand what’s new, and utilize dozens of time-saving tips and tricks. This book includes over 740 pages of easy-to-read instructions and over 1,000 carefully annotated screen shots to guide you to iPad mastery.
With iPad... | | Agile IT Security Implementation Methodology
Agile methodologies attack risk at its core. To identify risk early and often is the
premise of agile security. Risk comes in many forms. Organizations face security
threats every day. Risks are in the delivery and maintenance of the countermeasures.
Agile IT Security focuses on the details of the steps in delivering and maintaining... |
|
Beginning EJB 3, Java EE, 7th Edition
When we set out to write this book, our goal was to present Enterprise JavaBeans (EJB) to developers, with a keen
eye toward how this technology can be used in everyday, real-world applications. JSR-345: Enterprise JavaBeansTM,
Version 3.2 EJB Core Contracts and Requirements is a deep spec that addresses the ... | | Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,... | | Bayesian Networks in R: with Applications in Systems Biology (Use R!)
While there have been significant advances in capturing data from the entities
across complex real-world systems, their associations and relationships are largely
unknown. Associations between the entities may reveal interesting system-level
properties that may not be apparent otherwise. Often these associations are hypothesized... |
|
|
|
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 |