Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Carbon-Carbon Materials and Composites
Carbon-Carbon Materials and Composites
Carbon-carbon composites, which have been used extensively for missile applications, were a part of NASA's Apollo spacecraft heat shield system. The development of carbon-carbon materials began in 1958 and was nurtured under the U.S. Air Force space plane program, Dyna-Soar, and by numerous thermal protection systems...
Handbook of Cosmetic Science and Technology, Second Edition
Handbook of Cosmetic Science and Technology, Second Edition
Although cosmetics for the purpose of beautifying, perfuming, cleansing, or for rituals have existed since the origin of civilization, only in the 20th century great progress has been made in the diversification of products and functions and in the safety and protection of the consumer.

Before 1938, cosmetics were
...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks
Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks
Paintings, frescoes, antique photographic prints, incunabula, old books, handwritten documents, sculptures, ceramic fragments, and other ancient manufacts constitute the elements of an extremely valuable and immense historical patrimony. The digitalization of these treasures opens up the possibility of using image processing and...
Ceramic Matrix Composites: Fiber Reinforced Ceramics and their Applications
Ceramic Matrix Composites: Fiber Reinforced Ceramics and their Applications
Ceramic Matrix Composites (CMCs) represent a relatively new class of quasiductile ceramic materials. They are characterized by carbon or ceramic fi bers embedded in ceramic matrices (oxide or non - oxide) with comparatively low bonding forces between the fi bers and the matrix. These weak intefaces, in combination with a porous...
iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
Apple has a history of alternating its releases between user-focus and developer-focus. The good news about iOS 5 is that it's all about the developers. The addition of Automatic Reference Counting (ARC) alone is worth the upgrade for developers. In one move, Apple has eliminated the number one cause of crashes in iOS applications,...
iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

Adobe Photoshop CS6 on Demand (2nd Edition)
Adobe Photoshop CS6 on Demand (2nd Edition)
Welcome to Adobe Photoshop CS6 On Demand, a visual quick reference book that shows you how to work efficiently with Photoshop. This book provides complete coverage of basic to advanced Photoshop skills.

Need answers quickly? Adobe Photoshop CS6 on Demand provides those answers in a visual step-by-step format. We will...

Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)
Computer Architecture, Fifth Edition: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)

The computing world today is in the middle of a revolution: mobile clients and cloud computing have emerged as the dominant paradigms driving programming and hardware innovation today. The Fifth Edition of Computer Architecture focuses on this dramatic shift, exploring the ways in which software and technology in the cloud are accessed...

Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal

The field of intellectual property (typically referred to as IP) is one that continues its rapid growth. Just a few years ago, individuals who identifi ed themselves as practitioners in the fi eld of intellectual property were met with blank stares. Now IP professionals are in constant demand, and it is a rare issue of any legal newspaper...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy