Home | Amazing | Today | Tags | Publishers | Years | Search 
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

AIDS in South Asia: Understanding And Responding to a Heterogenous Epidemic (Health, Nutrition, and Population Series)
AIDS in South Asia: Understanding And Responding to a Heterogenous Epidemic (Health, Nutrition, and Population Series)

South Asia's HIV epidemic is highly heterogeneous. As a result, informed, prioritized, and effective responses necessitate an understanding of the epidemic diversity between and within countries. Further spread of HIV in South Asia is preventable. The future size of South Asia's epidemic will depend on an effective two-pronged...

Baby Boomers and Hearing Loss: A Guide to Prevention and Care
Baby Boomers and Hearing Loss: A Guide to Prevention and Care

In Baby Boomers and Hearing Loss, audiologist John Burkey shows readers how they can continue to enjoy youthful living, regardless of whether their hearing abilities are undiminished or severely compromised. In a reassuring and straightforward style, Burkey explains the typical causes of hearing loss, from genetic factors to...

Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)
Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)

Cardiac surgery is performed on hundreds of thousands of patients a year, and can have an important beneficial impact on the outcomes of patients with coronary and valvular heart diseases. Despite the favorable recovery of most patients, some will have their post-operative period interrupted by the development of atrial fibrillation, with a...

Management of Infectious Compli- Cations in Cancer Patients
Management of Infectious Compli- Cations in Cancer Patients

Infection is a major cause of morbidity and mortality in patients with neoplastic disease because of compromised host defenses. These defects result in an increased risk of infection and its complications. The nature of the underlying malignancy, the immunodeficiencies associated with it, and the treatments directed against it are all...

The Treatment of Glomerulonephritis (Developments in Nephrology)
The Treatment of Glomerulonephritis (Developments in Nephrology)

Glomerulonephritis is one of the commonest causes of end-stage renal failure worldwide. Although there have been considerable advances in the management of renal failure by dialysis and transplantation, there has been relatively little progress in its prevention. This volume sets out to review current practice in the treatment of...

The Gale Encyclopedia of Mental Disorders - 2 Volume Set
The Gale Encyclopedia of Mental Disorders - 2 Volume Set
The Gale Encyclopedia of Mental Disorders is a valuable source of information for anyone who wants to learn more about mental disorders and their treatments. This collection of approximately 400 entries provides in-depth coverage of specific disorders recognized by the American Psychiatric Association (as well as some...
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)
The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)

The Handbook of Homicide presents a series of original essays by renowned authors from around the world, reflecting the latest scholarship on the nature, causes, and patterns of homicide, as well as policies and practices for its investigation and prevention.

  • Includes comprehensive coverage of the complex phenomenon...
Basic Guide to System Safety
Basic Guide to System Safety

This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery,...

Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)
Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)

Features a comprehensive summary of the chemical, physiological, and nutritional relationships of all recognized vitamins!

Maintaining the standards of excellence set forth in the previous editions, the Handbook of Vitamins, Third Edition presents a thorough examination of the fundamental characteristics, functions, and roles
...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy