Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks
Digital Imaging for Cultural Heritage Preservation: Analysis, Restoration, and Reconstruction of Ancient Artworks
Paintings, frescoes, antique photographic prints, incunabula, old books, handwritten documents, sculptures, ceramic fragments, and other ancient manufacts constitute the elements of an extremely valuable and immense historical patrimony. The digitalization of these treasures opens up the possibility of using image processing and...
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins

As little as two decades ago, deliberately injecting botulinum toxin into patients would have seemed foolhardy at best and criminal at worst. The increased clinical use of botulinum toxins has expanded the body of knowledge available on the structure and function of these proteins. This knowledge can be applied to topics as varied as...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

Lactoferrin:  Natural - Multifunctional - Antimicrobial
Lactoferrin: Natural - Multifunctional - Antimicrobial

Illnesses resulting from foodborne pathogens occur at least 6 million times each year and cause an estimated 9,000 deaths. For decades, food microbiologists have developed various effective methods of food protection. However, the constant development of multi-facet food processing technologies and the emergence of potent foodborne pathogens,...

Smart Packaging Technologies for Fast Moving Consumer Goods
Smart Packaging Technologies for Fast Moving Consumer Goods

Smart Packaging Technologies for Fast Moving Consumer Goods approaches the subject of smart packaging from an innovative, thematic perspective:

  • Part 1 looks at smart packaging technologies for food quality and safety
  • Part 2 addresses smart packaging issues for the supply chain
  • ...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Get started and learn a step-by-step approach to application development using Microsoft Azure. Select the right services to solve the problem at hand in a cost-effective manner and explore the potential different services and how they can help in building enterprise applications.

Azure has an ample amount of
...
Introducing Windows Server 2012 R2
Introducing Windows Server 2012 R2

NOTE: This title is also available as a free eBook on the Microsoft Download Center. It is offered for sale in print format as a convenience.

Get a head start evaluating Windows Server 2012 R2 - with technical insights from a Microsoft MVP and members of the Windows Server product team. Based on final Windows Server 2012 R2...

Bioactive Natural Products: Detection, Isolation, and Structural Determination, Second Edition
Bioactive Natural Products: Detection, Isolation, and Structural Determination, Second Edition

Bioactive natural products are proving to be a rich source of novel therapeutics to both protect against and combat diseases, as well as serve as lead compounds in crop protection. Following the successful format of the first edition, this volume brings together collective research from many new contributors and emphasizes the rationale...

Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy