Neo4j in Action
Neo4j in Action is a comprehensive guide to Neo4j, aimed at application developers and software architects. Using hands-on examples, you'll learn to model graph domains naturally with Neo4j graph structures. The book explores the full power of native Java APIs for graph data manipulation and...
Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
Explore the insights and importance of testing your corporate network systems before the hackers strike
Mobile Telemedicine: A Computing and Networking Perspective Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
Yeast as a Tool in Cancer Research
Leland H. Hartwell Director, Fred Hutchinson Cancer Research Center, Nobel Laureate for Medicine, 2001 Yeast has proved to be the most useful single-celled organism for studying the fundamental aspects of cell biology. Resources are now available for yeast that greatly simplify and empower new investigations, like the presence of strains with...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...
|Result Page: 6 5 4 3 2 1 |