Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Ergodic Dynamics: From Basic Theory to Applications (Graduate Texts in Mathematics, 289)
Ergodic Dynamics: From Basic Theory to Applications (Graduate Texts in Mathematics, 289)

This textbook provides a broad introduction to the fields of dynamical systems and ergodic theory. Motivated by examples throughout, the author offers readers an approachable entry-point to the dynamics of ergodic systems. Modern and classical applications complement the theory on topics ranging from financial fraud to...

Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Release It!: Design and Deploy Production-Ready Software
Release It!: Design and Deploy Production-Ready Software

You’ve worked hard on the project for more than year. Finally, it looks like all the features are actually complete, and most even have unit tests. You can breathe a sigh of relief. You’re done.

Or are you?

Does “feature complete” mean “production ready”? Is your system
...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Hepatitis Delta Virus (Current Topics in Microbiology and Immunology)
Hepatitis Delta Virus (Current Topics in Microbiology and Immunology)

Hepatitis delta virus (HDV), which causes severe acute and chronic liver disease, was discovered nearly 30 years ago following the detection of a novel antigen-antibody system in hepatitis B virus carriers. HDV has continued to surprise and fascinate medical science ever since. This volume reviews recent developments in HDV research, from...

Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Switching to a Mac For Dummies
Switching to a Mac For Dummies

Maybe you love your iPhone or iPod and are curious about other Apple products. Maybe you’ve had one virus scare too many and are fed up with Windows. Maybe the daunting prospect of upgrading to Windows 7 has made you open to other possibilities. Maybe you’re a Mac fan who wants to show a friend how easy and productive Macs...

Hepatitis C Virus Disease: Immunobiology and Clinical Applications
Hepatitis C Virus Disease: Immunobiology and Clinical Applications

Despite numerous hepatitis C virus infection studies, its pathogenesis and medical treatment have not been fully explained. This comprehensive volume, written by experts in the field, covers the most recent advances in the study of HCV, moving from basic research to clinical applications. The first chapters of this volume analyze the full...

Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)
Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)

A comprehensive collection of cutting-edge methods to study and work with the vaccinia virus and other poxvirus gene transcriptions. These readily reproducible techniques can be used for the construction and characterization of recombinant viruses; for the study of poxvirus gene transcription and DNA replication; for the investigation of the...

Rabies
Rabies

Rabies offers a complete account of one of the oldest known diseases threatening public health today. Unlike most research-oriented descriptions of rabies, this book provides a narrative about the disease and its etiologic agent, encompassing the historical background to recent developments. The emphasis on the basic biology and...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy