|
|
|
|
|
|
Infectious Disease InformaticsInfectious Diseases Informatics
Edited by
Vitali Sintchenko
The University of Sydney, Sydney, Australia
Preface.- List of contributors.- 1Informatics for Infectious Disease Research and Control.- 2 Bioinformatics of Microbial Sequences.- 3 Mining Databases for Microbial Gene Sequences.- 4 Comparative Genomics of... | | Disarming Strangers
In June 1994 the United States went to the brink of war with North Korea. With economic sanctions impending, President Bill Clinton approved the dispatch of substantial reinforcements to Korea, and plans were prepared for attacking the North's nuclear weapons complex. The turning point came in an extraordinary private diplomatic... | | Encyclopedia Of Database Technologies And ApplicationsThere are a myriad of new directions in which databases are growing, presenting new and exciting challenges that promise flux in the whole society, because of the impact and changes the database systems have provoked almost everywhere in modern life. This ranges from the way the organizations operate and make their business decisions, to the use of... |
|
Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... | | Covert Java: Techniques for Decompiling, Patching, and Reverse EngineeringAs a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,... | | |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |