Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Harper's Illustrated Biochemistry
Harper's Illustrated Biochemistry
Sci-Tech Book News : "Originally published in 1939, this enduring reference/text continues with its mission to introduce biochemistry concepts to medical and health sciences students in concise text supported with graphs, charts, and diagrams. Updating the 2003 26th edition (which was drastically revised to make it shorter), the 27th...
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Computational Line Geometry (Mathematics and Visualization)
Computational Line Geometry (Mathematics and Visualization)

The geometry of lines occurs naturally in such different areas as sculptured surface machining, computation of offsets and medial axes, surface reconstruction for reverse engineering, geometrical optics, kinematics and motion design, and modeling of developable surfaces. This book covers line geometry from various viewpoints and aims towards...

Asp Configuration Handbook
Asp Configuration Handbook
The Complete Guide to Migrating an ISP to an ASP ISPs are now faced with a narrowing margin brought on by fierce competition, with little available differentiation in their offerings. In order to reverse this decline in profitability, ISPs have begun to expand services beyond bandwidth and connectivity, by adding remote hosting services such as...
Effective Software Test Automation: Developing an Automated Software Testing Tool
Effective Software Test Automation: Developing an Automated Software Testing Tool

Whatever its claims, commercially available testing software is not automatic. Configuring it to test your product is almost as time-consuming and error-prone as purely manual testing.

There is an alternative that makes both engineering and economic sense: building your own, truly automatic tool. Inside, you’ll learn a repeatable,...

Infectious Disease Informatics
Infectious Disease Informatics

Infectious Diseases Informatics

Edited by

Vitali Sintchenko

The University of Sydney, Sydney, Australia

Preface.- List of contributors.- 1Informatics for Infectious Disease Research and Control.- 2 Bioinformatics of Microbial Sequences.- 3 Mining Databases for Microbial Gene Sequences.- 4 Comparative Genomics of...

Disarming Strangers
Disarming Strangers

In June 1994 the United States went to the brink of war with North Korea. With economic sanctions impending, President Bill Clinton approved the dispatch of substantial reinforcements to Korea, and plans were prepared for attacking the North's nuclear weapons complex. The turning point came in an extraordinary private diplomatic...

Encyclopedia Of Database Technologies And Applications
Encyclopedia Of Database Technologies And Applications
There are a myriad of new directions in which databases are growing, presenting new and exciting challenges that promise flux in the whole society, because of the impact and changes the database systems have provoked almost everywhere in modern life. This ranges from the way the organizations operate and make their business decisions, to the use of...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering

As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling,...

 
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy