Home | Amazing | Today | Tags | Publishers | Years | Search 
Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)
Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)

Leading investigators and clinicians detail the different mechanisms used by tumors to escape and impair the immune system and then spell out possible clinical strategies to prevent or reverse tumor-induced immune dysfunction. The authors review the mechanisms of immune dysfunction and evasion mechanisms in histologically diverse human...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Avid Media Composer 6.x Cookbook
Avid Media Composer 6.x Cookbook

Overview:

An expert and clear resource filled with highly effective "recipes" of easy to follow steps for those at all experience levels. Gain Avid Media Composer (and Avid Symphony) essentials and far beyond, including techniques, tips, tricks,
...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World

Build a working knowledge of data modeling concepts and best practices, along with how to apply these principles with ER/Studio. This second edition includes numerous updates and new sections including an overview of ER/Studio's support for agile development, as well as a description of some of ER/Studio's newer features for NoSQL,...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Dreamweaver CS5.5 Mobile and Web Development with HTML5, CSS3, and jQuery
Dreamweaver CS5.5 Mobile and Web Development with HTML5, CSS3, and jQuery
With this book and your knowledge of Dreamweaver you'll be able to confidently enter the brave new world of HTML5, CSS3, and jQuery. Learning is easy thanks to a hands-on, step-by-step approach. Overview Create web pages in Dreamweaver using the latest technology and approach Add multimedia and interactivity to your websites Optimize your...
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building up to higher-order models. Included in the higher-order discussions are multivariate models, higher-order...
Advanced Materials for Membrane Fabrication and Modification
Advanced Materials for Membrane Fabrication and Modification

Membranes are an energy efficient separation technology that are now the basis for many water treatment and food processing applications. However, there is the potential to improve the operating performance of these separations and to extend the application of membranes to energy production, gas separations, organic solvent-based...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy