Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Network (Second Edition)
Hack Proofing Your Network (Second Edition)
This book is intended to teach skills that will be useful for breaking into computers.
If that statement shocks you, then you probably aren’t familiar with the
legitimate reasons for hacking.These reasons can be security testing, consumer
advocacy and civil rights, military interests, and “hacktivist” politics;
...
Cognitive Rehabilitation in Old Age
Cognitive Rehabilitation in Old Age
"The authors provide a comprehensive overview of important topics"--Annals, March 2001

"Gerontologists and psychologists explore concepts that could aid research into intervening to reverse or slow cognitive deficits resulting from old age, and the application of specific cognitive training strategies in natural settings.
...
Exploiting Software : How to Break Code
Exploiting Software : How to Break Code
How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools,
...
Color Atlas of Pharmacology (Thieme Flexibook)
Color Atlas of Pharmacology (Thieme Flexibook)

The present second edition of the Color Atlas of Pharmacology goes to print six years after the first edition. Numerous revisions were needed, highlighting the dramatic continuing progress in the drug sciences. In particular, it appeared necessary to include novel therapeutic principles, such as the inhibitors of platelet aggregation from the...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Object Oriented Reengineering Patterns (The Morgan Kaufmann Series in Software Engineering and Programming)
Object Oriented Reengineering Patterns (The Morgan Kaufmann Series in Software Engineering and Programming)
"This book speaks with experience. It gives you the building blocks for a plan to tackle a difficult code base and the context for techniques like refactoring. It is a sad fact that there are too few of these kinds of books out there, when reengineering is such a common event. But I'm at least glad to see that while there aren't many books in...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)

Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams, Second Edition, database designers, developers, and students preparing...

Aligning Modern Business Processes and Legacy Systems: A Component-Based Perspective
Aligning Modern Business Processes and Legacy Systems: A Component-Based Perspective
"Willem-Jan van den Heuvel was an early participant in efforts to map business processes to business components and find an intelligent way to leverage legacy systems. Carrying this work forward, his current book provides a strategic introduction to business component design that is essential reading for CIOs, system architects, designers, and...
Kinematic Analysis of Robot Manipulators
Kinematic Analysis of Robot Manipulators

This text provides a first-level understanding of the structure, mobility, and analysis of serial manipulators. A serial manipulator is an unclosed or open movable polygon consisting of a series of links and joints. One end is fixed to ground, and attached to the open end is a hand or end effector that can move freely in space.

The...

Engineering and Technology Management Tools and Applications
Engineering and Technology Management Tools and Applications
Today engineering and technology have become important factors in global
competitiveness. Under a fierce competitive environment, engineering and
technology managers are forced to achieve marketable results by focusing on
areas such as speed, quality, and cost. This can only be achieved through
effective planning, organization,
...
Learning Pentesting for Android Devices
Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy