Home | Amazing | Today | Tags | Publishers | Years | Search 
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
AIDS (Diseases and Disorders)
AIDS (Diseases and Disorders)
CHARLES BEST, ONE of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the gratification of knowing one is helping people,” he confided, “although that probably is a more heroic and selfless motivation. Those feelings...
2: Placenta and Trophoblast: Methods and Protocols, Volume II (Methods in Molecular Medicine)
2: Placenta and Trophoblast: Methods and Protocols, Volume II (Methods in Molecular Medicine)

The aim of the two-volume set of Placenta and Trophoblast: Methods and Protocols is to offer contemporary approaches for studying the biology of the placenta. The chapters contained herein also address critical features of the female organ within which the embryo is housed, the uterus, and some aspects of the embryo–fetus itself,...

Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)
Cancer Immunotherapy at the Crossroads: How Tumors Evade Immunity and What Can Be Done (Current Clinical Oncology)

Leading investigators and clinicians detail the different mechanisms used by tumors to escape and impair the immune system and then spell out possible clinical strategies to prevent or reverse tumor-induced immune dysfunction. The authors review the mechanisms of immune dysfunction and evasion mechanisms in histologically diverse human...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Avid Media Composer 6.x Cookbook
Avid Media Composer 6.x Cookbook

Overview:

An expert and clear resource filled with highly effective "recipes" of easy to follow steps for those at all experience levels. Gain Avid Media Composer (and Avid Symphony) essentials and far beyond, including techniques, tips, tricks,
...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World
Data Modeling Made Simple with Embarcadero ER/Studio Data Architect: Adapting to Agile Data Modeling in a Big Data World

Build a working knowledge of data modeling concepts and best practices, along with how to apply these principles with ER/Studio. This second edition includes numerous updates and new sections including an overview of ER/Studio's support for agile development, as well as a description of some of ER/Studio's newer features for NoSQL,...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Dreamweaver CS5.5 Mobile and Web Development with HTML5, CSS3, and jQuery
Dreamweaver CS5.5 Mobile and Web Development with HTML5, CSS3, and jQuery
With this book and your knowledge of Dreamweaver you'll be able to confidently enter the brave new world of HTML5, CSS3, and jQuery. Learning is easy thanks to a hands-on, step-by-step approach. Overview Create web pages in Dreamweaver using the latest technology and approach Add multimedia and interactivity to your websites Optimize your...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy