Home | Amazing | Today | Tags | Publishers | Years | Search 
Infectious Diseases
Infectious Diseases

The Third Edition of this definitive reference provides comprehensive guidelines on the diagnosis, treatment, and prevention of every infectious disease seen in current clinical practice. More than 300 world-class practitioners detail the full range of clinical infections, microbial agents, viruses, mycobacteria, fungi, and parasites...

Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach
Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach

Unlike many texts, which are organized by disease or pathogen, this unique resource presents a problem-oriented approach to the diagnosis and management of infectious diseases in children.

All chapters are organized by anatomic syndrome and guide you through each step in the management process from classifying the...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Complete General Science for IAS: Includes physics, chemistry and biology by sifox publication.
Complete General Science for IAS: Includes physics, chemistry and biology by sifox publication.
Science is valued mostly for its practical advantages though it is also valued of gratifying disinterested curiosity and as an object of great aesthetic charm. It is quite obvious that the bulk of mankind, value science, chiefly for the practical advantages it brings with it. PART – I PHYSICS Sl. No. TOPICS PAGE No. 1. Wave Theory...
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Recombinant Protein Production in Yeast (Methods in Molecular Biology)
Recombinant Protein Production in Yeast (Methods in Molecular Biology)

This volume provides an overview of the main yeast production platforms currently used and future yeast cell factories for recombinant protein production. Chapters detail approaches of genetic and metabolic engineering, co-factor containing proteins and virus-like particles, glycoproteins, and post-translational...

City of Omens: A Search for the Missing Women of the Borderlands
City of Omens: A Search for the Missing Women of the Borderlands

For decades, American hungers sustained Tijuana. In this scientific detective story, a public health expert reveals what happens when a border city’s lifeline is brutally severed.

Despite its reputation as a carnival of vice, Tijuana was, until recently, no more or less violent than neighboring San
...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy