Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology
Handbook of Neurochemistry and Molecular Neurobiology: Neuroimmunology

Neuroimmunology is one of the most rapidly developing branches of Neurobiology, prompted by novel neurochemical, neuroendocrinological, and neurophysiological investigations of the central and peripheral nervous system including neuroendocrine systems. Neuroimmunology can be considered as an interdisciplinary science that covers relevant...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Macs For Dummies
Macs For Dummies

What an amazing time to get to know the Mac. For years these elegantly designed computers have been a model of simplicity and virus-free stability. But that’s never stopped Apple from making these machines even harder to resist by applying stunning changes.

Consider Apple’s seismic embrace of Intel a few years...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Return of the Black Death: The World's Greatest Serial Killer
Return of the Black Death: The World's Greatest Serial Killer

If the twenty-first century seems an unlikely stage for the return of a 14th-century killer, the authors of Return of the Black Death argue that the plague, which vanquished half of Europe, has only lain dormant, waiting to emerge again—perhaps, in another form. At the heart of their chilling scenario is their contention...

Medical Microbiology, 24th edition
Medical Microbiology, 24th edition

The landmark clinical guide to the role microorganisms play in human health and illnesses -- extensively revised and updated

A Doody's Core Title!

Linking fundamental microbiology concepts with the diagnosis and treatment of clinical infections, this one-of-a-kind, portable text delivers an essential...

Microsoft Outlook 2010 Inside Out
Microsoft Outlook 2010 Inside Out

You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...

Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy