Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Python High Performance Programming
Python High Performance Programming

If you have at least a basic knowledge of Python, this book will help you maximize the performance of your code and applications. Easy to follow tutorials will make you a hard act to follow in Python programming.

Overview

  • Identify the bottlenecks in your applications and solve them using the best...
Photoshop for the Web: Covers Photoshop 5.5 and ImageReady 2.0
Photoshop for the Web: Covers Photoshop 5.5 and ImageReady 2.0

In this second edition, author Mikkel Aaland updatesPhotoshop for the Web to include important new techniques and workarounds for the latest release of Photoshop--version 5.5. The first edition was loaded with step-by-step examples and real-world solutions from some of the world's hottest Web sites. The second edition adds...

Clojure High Performance Programming - Second Edition
Clojure High Performance Programming - Second Edition

Become an expert at writing fast and high performant code in Clojure 1.7.0

About This Book

  • Enhance code performance by using appropriate Clojure features
  • Improve the efficiency of applications and plan their deployment
  • A hands-on guide to designing Clojure programs to get...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
BioMEMS and Biomedical Nanotechnology
BioMEMS and Biomedical Nanotechnology
Numerous miniaturized DNA microarray, DNA chip, Lab on a Chip and biosensor devices have been developed and commercialized. Such devices are improving theway many important genomic and proteomic analyses are performed in both research and clinical diagnostic laboratories. The development of these technologies was enabled by a...
Biomarkers in Breast Cancer (Cancer Drug Discovery and Development)
Biomarkers in Breast Cancer (Cancer Drug Discovery and Development)

Expert laboratory and clinical researchers from around the world review how to design and evaluate studies of tumor markers and examine their use in breast cancer patients. The authors cover both the major advances in sophisticated molecular methods and the state-of-the-art in conventional prognostic and predictive indicators. Among the...

Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an...

Neuroblastoma
Neuroblastoma

Neuroblastoma is a medical enigma. As a childhood neoplasm arising from neural crest cells, it is characterized by diverse clinical behaviors ranging from spontaneous remission to rapid tumor progression and death. Although clinical outcome can be predicted to a large extent by the stage of disease and the age at diagnosis, an in-depth...

Heterogeneous Computing with OpenCL, Second Edition: Revised OpenCL 1.2 Edition
Heterogeneous Computing with OpenCL, Second Edition: Revised OpenCL 1.2 Edition

Heterogeneous Computing with OpenCL teaches OpenCL and parallel programming for complex systems that may include a variety of device architectures: multi-core CPUs, GPUs, and fully-integrated Accelerated Processing Units (APUs) such as AMD Fusion technology. Designed to work on multiple platforms and with wide industry support, OpenCL...

Rape Investigation Handbook
Rape Investigation Handbook
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com

An unprecedented collaborative work -- the first
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy