Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Object-Oriented Data Modeling (Cooperative Information Systems)
Advances in Object-Oriented Data Modeling (Cooperative Information Systems)
This book focuses on recent developments in representational and processing aspects of complex data-intensive applications.

Focuses on recent developments in representational and processing aspects of object-oriented data modeling, covering hot topics such as reverse engineering and work-flow modeling. Each chapter contains a
...
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

Oracle Goldengate 11g Complete Cookbook
Oracle Goldengate 11g Complete Cookbook

Over 60 simple and easy-to-follow recipes to perform various Goldengate administration tasks such as installing, configuring, and maintaining Goldengate replication

Overview

  • Various recipes that will help you to set up Goldengate in various environments
  • Practical examples of Goldengate...
A Dictionary of Real Numbers
A Dictionary of Real Numbers
How do we recognize that the number .93371663... is actually 21og1 0(e + 7r)/2 ? Gauss observed that the number 1.85407467... is (essentially) a rational value of an elliptic integral—an observation that was critical in the development of nineteenth century analysis. How do we decide that such a number is actually a special value of a...
Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software engineering is widely recognized as one of the most exciting, stimulating, and profitable research areas, with a significant practical impact on the software industry. Thus, training future generations of software engineering researchers and bridging the gap between academia and industry are vital to the field. The International Summer...
JNCIA: Juniper Networks Certified Internet Associate Study Guide
JNCIA: Juniper Networks Certified Internet Associate Study Guide

Here’s the book you need to prepare for the JNCIA exam JNO-201 from Juniper Networks. Written by a team of Juniper Networks trainers and engineers, this Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of official test objectives
  • Hundreds of...
Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Membrane Technology and Applications
Membrane Technology and Applications
My introduction to membranes was as a graduate student in 1963. At that time membrane permeation was a sub-study of materials science. What is now called membrane technology did not exist, nor did any large industrial applications of membranes. Since then, sales of membranes and membrane equipment have increased more than...
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy