Home | Amazing | Today | Tags | Publishers | Years | Search 
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World

Build a working knowledge of data modeling concepts and best practices, along with how to apply these principles with ER/Studio. This second edition includes numerous updates and new sections including an overview of ER/Studio's support for agile development, as well as a description of some of ER/Studio's newer features for NoSQL,...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Avid Media Composer 6.x Cookbook
Avid Media Composer 6.x Cookbook

Overview:

An expert and clear resource filled with highly effective "recipes" of easy to follow steps for those at all experience levels. Gain Avid Media Composer (and Avid Symphony) essentials and far beyond, including techniques, tips, tricks,
...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)
Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)

Leading investigators and clinicians detail the different mechanisms used by tumors to escape and impair the immune system and then spell out possible clinical strategies to prevent or reverse tumor-induced immune dysfunction. The authors review the mechanisms of immune dysfunction and evasion mechanisms in histologically diverse human...

2: Placenta and Trophoblast: Methods and Protocols, Volume II (Methods in Molecular Medicine)
2: Placenta and Trophoblast: Methods and Protocols, Volume II (Methods in Molecular Medicine)

The aim of the two-volume set of Placenta and Trophoblast: Methods and Protocols is to offer contemporary approaches for studying the biology of the placenta. The chapters contained herein also address critical features of the female organ within which the embryo is housed, the uterus, and some aspects of the embryo–fetus itself,...

AIDS (Diseases and Disorders)
AIDS (Diseases and Disorders)
CHARLES BEST, ONE of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the gratification of knowing one is helping people,” he confided, “although that probably is a more heroic and selfless motivation. Those feelings...
Practical Electronics: Components and Techniques
Practical Electronics: Components and Techniques

How much do you need to know about electronics to create something interesting, or creatively modify something that already exists? If you’d like to build an electronic device, but don’t have much experience with electronics components, this hands-on workbench reference helps you find answers to technical questions...

Building Web and Mobile ArcGIS Server Applications with JavaScript
Building Web and Mobile ArcGIS Server Applications with JavaScript

Improve your knowledge and career prospects in web or mobile application development with this step-by-step practical guide to ArcGIS Server. Gives a good grounding in everything from creating maps to network analysis.

Overview

  • Develop ArcGIS Server applications with JavaScript, both for traditional web...
Hand transplantation
Hand transplantation
The story of this book is quite simple: after the first few hand transplants, we felt the need to have regular meetings so that our clinical experiences would be beneficially shared and serve as a basis to draw some guidelines for the future. In so doing, we soon realised that a huge amount of original clinical data and...
Tumor Metabolome Targeting and Drug Development (Cancer Drug Discovery and Development)
Tumor Metabolome Targeting and Drug Development (Cancer Drug Discovery and Development)

In this volume, the major metabolic alterations identified in cancer and tumor-associated cells are explored, including discussions of former and emerging approaches to drug development in targeting cancer cell metabolism.

The metabolic network in cells promotes the generation of both energy and biomass needed for them to
...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy