 |
|
|
 DarkMarket: Cyberthieves, Cybercops and You
"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." --Roberto Saviano, author of Gommorah
The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a... |  |  Bone Resorption (Topics in Bone Biology)
Bone Resorption, the second volume of the series Topics in Bone Biology, is
centered on the osteoclast, the bone-resorbing cell. The volume thus complements
the first volume of the series, Bone Formation, which discussed
origin, function, and pathology of the bone-forming cell, the osteoblast.Both
volumes are addressed to... |  |  GNOME 3 Application Development Beginner's Guide
Step-by-step practical guide to get to grips with GNOME application development
Overview
-
Full of easy to follow tutorials with ready-to-run code.
-
Covers most of the subsystems in the GNOME 3 platform stack, from low to high level.
-
Adapts common good development practices with...
|
|
 Human Impact on the Natural Environment
A brand new edition of the definitive textbook on humankind’s impact on the Earth’s environment—now in full color
This classic text explores the multitude of impacts that humans have had over time upon vegetation, animals, soils, water, landforms, and the atmosphere. It considers the ways in which climate... |  |  The Heartland: An American History
A history of a quintessentially American place--the rural and small town heartland--that uncovers deep yet hidden currents of connection with the world.
When Kristin L. Hoganson arrived in Champaign, Illinois, after teaching at Harvard, studying at Yale, and living in the D.C. metro area with various stints overseas, ... |  |  Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |
|
 Hacker Web Exploitation UncoveredWritten from both from the attacker's and security specialist's perspective, this thorough guide uncovers how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is... |  |  Hacker Debugging Uncovered (Uncovered series)Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of... |  |  BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer ... |
|
| Result Page: 6 5 4 3 2 1 |