Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nitric Oxide Protocols (Methods in Molecular Biology)
Nitric Oxide Protocols (Methods in Molecular Biology)
It has been more than five years since the appearance of the first edition of Nitric Oxide Protocols. According to Medline, more than 32,500 publications dealing with nitric oxide have appeared in the primary literature in the intervening time from 1999 to April 2004. These numbers attest to the continuing vitality of a field...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Windows XP Hacks & Mods For Dummies (Computer/Tech)
Windows XP Hacks & Mods For Dummies (Computer/Tech)
Make Windows XP look, feel, and act the way you want

Simplify searches, find free virus protection, and make Windows love your iPod®

Hacks? Mods? Don't be frightened — this book walks you through each and every one, and even steers you clear of well-known hacks that don't really accomplish anything. See how some simple...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Infectious Diseases
Infectious Diseases

The Third Edition of this definitive reference provides comprehensive guidelines on the diagnosis, treatment, and prevention of every infectious disease seen in current clinical practice. More than 300 world-class practitioners detail the full range of clinical infections, microbial agents, viruses, mycobacteria, fungi, and parasites...

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach
Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach

Unlike many texts, which are organized by disease or pathogen, this unique resource presents a problem-oriented approach to the diagnosis and management of infectious diseases in children.

All chapters are organized by anatomic syndrome and guide you through each step in the management process from classifying the...

The Nidoviruses: Toward Control of SARS and other Nidovirus Diseases (Advances in Experimental Medicine and Biology)
The Nidoviruses: Toward Control of SARS and other Nidovirus Diseases (Advances in Experimental Medicine and Biology)
This book summarizes the keynote and plenary speeches and posters of the “Xth International Nidovirus Symposium: Toward Control of SARS and Other Nidovirus Diseases” that was held in Colorado Springs, Colorado, June 25–30, 2005. The nine previous meetings of scientists investigating the molecular biology and...
Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)
Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)

Adenovirus Methods and Protocols, Second Edition, now in two volumes, is an essential resource for adenovirus (Ad) researchers beginning in the field, and an inspirational starting point for researchers looking to branch into new areas of Ad study. In addition to updating and expanding important chapters from the first edition, the authors...

Herpes Simplex Virus Epithelial Keratitis: In Vivo Morphology in the Human Cornea
Herpes Simplex Virus Epithelial Keratitis: In Vivo Morphology in the Human Cornea

This book on Herpes Simplex Virus Epithelial Keratitis shows a kind of ‘living histology’, revealing both morphological and dynamic features of the disease, and explaining mechanisms behind them. It offers great insights helpful for the differential diagnostics and the recognition of less known variants as well as of complications....

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

SQL Server Security Distilled, Second Edition
SQL Server Security Distilled, Second Edition

SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern for all businesses. Securing SQL Server is one of the most important responsibilities of the SQL Server professional.

SQL Server Distilled, Second Edition is a very carefully researched, clearly explained book...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy