Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

The Practical Guide to Defect Prevention (Best Practices)
The Practical Guide to Defect Prevention (Best Practices)

This practical, hands-on guide captures, categorizes, and builds a process of best practices to avoid creating defects during the development process—rather than fixing them after extensive analysis. While there are various proprietary and competing standards for reducing software defects, these methods suffer from issues surrounding...

A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
This book is a third-party evaluation of H1N1 prevention and control effects in China. Based on the characteristic of H1N1 pandemic around the world and current public health management system in China, this book evaluates the comprehensive effects by considering the countermeasures, joint prevent and control mechanism operated by central and...
Dealing with Child Abuse and Neglect as Public Health Problems: Prevention and the Role of Juvenile Ageism
Dealing with Child Abuse and Neglect as Public Health Problems: Prevention and the Role of Juvenile Ageism

This thought-provoking volume defines child abuse and neglect as a public health crisis, both in terms of injuries and mental health problems and as a link to poverty and other negative social outcomes. The author identifies key factors contributing to this situation?in particular juvenile ageism, the pervasive othering of children...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms, Volume 1
Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms, Volume 1
The aim of Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms is to present recent developments in cell survival and apoptotic pathways and their involvement in human diseases, such as cancers and neurodegenerative disorders. This requires an integration of knowledge from several fields of research, including...
Using Game Theory to Improve Safety within Chemical Industrial Parks
Using Game Theory to Improve Safety within Chemical Industrial Parks

Though the game-theoretic approach has been vastly studied and utilized in relation to economics of industrial organizations, it has hardly been used to tackle safety management in multi-plant chemical industrial settings. Using Game Theory for Improving Safety within Chemical Industrial Parks presents an in-depth discussion of...

Managing Skin Cancer
Managing Skin Cancer

Skin cancer is the most common malignant neoplasm and its incidence is rising worldwide. The epidemic increase in such tumors calls for efficient management by the application of appropriate guidelines for therapy and prevention. Clinicians managing these patients need to keep up to date with the latest advances, allowing them to provide optimal...

Cancer of the Gastrointestinal Tract: A Handbook for Nurse Practitioners (Handbook for Nurse Practitioners Series (Whurr))
Cancer of the Gastrointestinal Tract: A Handbook for Nurse Practitioners (Handbook for Nurse Practitioners Series (Whurr))

This text is a primer on the care of the patient with cancer of the gastrointestinal tract, for nurses who may not have experience in this demanding speciality.

The book begins with a comprehensive look at the issues and scope of the frequently used term "quality of life". Chapters two and three take an in-depth look at...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy