Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Beginning Microsoft SQL Server 2008 Administration
Beginning Microsoft SQL Server 2008 Administration
SQL Server 2008 introduces many new features that will change database administration procedures; many DBAs will be forced to migrate to SQL Server 2008. This book teaches you how to develop the skills required to successfully administer a SQL Server 2008 database; no prior experience is required. The material covers system installation and...
Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Ethics and Law for School Psychologists
Ethics and Law for School Psychologists
This completely updated edition of the leading ethics and law guide for students, as well as practicing school psychologists, provides authoritative, timely information on professional standards and legal requirements pertinent to the delivery of school psychological services. Ethics and Law for School

Psychologists, Fourth Edition covers a...

Epidemiology: A Very Short Introduction (Very Short Introductions)
Epidemiology: A Very Short Introduction (Very Short Introductions)

Epidemiology plays an all-important role in many areas of medicine, from discovering the relationship between tobacco smoking and lung cancer, to documenting the impact of diet, the environment, and exercise on general health, to tracking the origin and spread of new epidemics such as Swine Flu. It is truly a vital field, central to the...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Quality of Life and Human Difference: Genetic Testing, Health Care, and Disability
Quality of Life and Human Difference: Genetic Testing, Health Care, and Disability
Genetic technology has enabled us to test fetuses for an increasing number of diseases and impairments. On the basis of this genetic information, prospective parents can predict – and prevent – the birth of children likely to have those conditions. In developed countries, prenatal genetic testing has now become a...
Disaster and Respiratory Diseases (Respiratory Disease Series: Diagnostic Tools and Disease Managements)
Disaster and Respiratory Diseases (Respiratory Disease Series: Diagnostic Tools and Disease Managements)
This book provides valuable data on the outbreak, aggravation, treatment and prevention of respiratory diseases based on prior experiences of natural disasters such as earthquakes and tsunamis. Poor hygiene and air pollution can lead to the onset of pneumonia and other respiratory disease, while a lack of medical supplies aggravates...
MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
Home Blood Pressure Monitoring (Updates in Hypertension and Cardiovascular Protection)
Home Blood Pressure Monitoring (Updates in Hypertension and Cardiovascular Protection)

Hypertension remains a leading cause of disability and death worldwide. Self-monitoring of blood pressure by patients at home is currently recommended as a valuable tool for the diagnosis and management of hypertension. Unfortunately, in clinical practice, home blood pressure monitoring is often inadequately implemented, mostly due...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy