Home | Amazing | Today | Tags | Publishers | Years | Search 
Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach
Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach

Unlike many texts, which are organized by disease or pathogen, this unique resource presents a problem-oriented approach to the diagnosis and management of infectious diseases in children.

All chapters are organized by anatomic syndrome and guide you through each step in the management process from classifying the...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
What you should know about the Covid-19 vaccines from top experts in the field.

As the SARS-Cov2 virus emerged and spread globally in early 2020, unprecedented international efforts began to develop and test vaccines to control the devastating pandemic. This book focuses on the remarkable progress in developing
...
Ergodic Dynamics: From Basic Theory to Applications (Graduate Texts in Mathematics, 289)
Ergodic Dynamics: From Basic Theory to Applications (Graduate Texts in Mathematics, 289)

This textbook provides a broad introduction to the fields of dynamical systems and ergodic theory. Motivated by examples throughout, the author offers readers an approachable entry-point to the dynamics of ergodic systems. Modern and classical applications complement the theory on topics ranging from financial fraud to...

The Age of Living Machines: How Biology Will Build the Next Technology Revolution
The Age of Living Machines: How Biology Will Build the Next Technology Revolution

From the former president of MIT, the story of the next technology revolution, and how it will change our lives.

A century ago, discoveries in physics came together with engineering to produce an array of astonishing new technologies: radios, telephones, televisions, aircraft, radar, nuclear power,...

City of Omens: A Search for the Missing Women of the Borderlands
City of Omens: A Search for the Missing Women of the Borderlands

For decades, American hungers sustained Tijuana. In this scientific detective story, a public health expert reveals what happens when a border city’s lifeline is brutally severed.

Despite its reputation as a carnival of vice, Tijuana was, until recently, no more or less violent than neighboring San
...

Recombinant Protein Production in Yeast (Methods in Molecular Biology)
Recombinant Protein Production in Yeast (Methods in Molecular Biology)

This volume provides an overview of the main yeast production platforms currently used and future yeast cell factories for recombinant protein production. Chapters detail approaches of genetic and metabolic engineering, co-factor containing proteins and virus-like particles, glycoproteins, and post-translational...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Otosclerosis And Stapes Surgery (Advances in Oto-Rhino-Laryngology)
Otosclerosis And Stapes Surgery (Advances in Oto-Rhino-Laryngology)

Otosclerosis is a disorder causing a hardening of the middle ear bones which leads to a progressive hearing loss. Internationally renowned experts met in Saas Fee (Switzerland) in 2004 to discuss otosclerosis and stapes surgery, and they have subsequently been invited by the editor to present their findings in this publication. From basic to...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy