Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)
Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)

Adenovirus Methods and Protocols, Second Edition, now in two volumes, is an essential resource for adenovirus (Ad) researchers beginning in the field, and an inspirational starting point for researchers looking to branch into new areas of Ad study. In addition to updating and expanding important chapters from the first edition, the authors...

Herpes Simplex Virus Epithelial Keratitis: In Vivo Morphology in the Human Cornea
Herpes Simplex Virus Epithelial Keratitis: In Vivo Morphology in the Human Cornea

This book on Herpes Simplex Virus Epithelial Keratitis shows a kind of ‘living histology’, revealing both morphological and dynamic features of the disease, and explaining mechanisms behind them. It offers great insights helpful for the differential diagnostics and the recognition of less known variants as well as of complications....

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

SQL Server Security Distilled, Second Edition
SQL Server Security Distilled, Second Edition

SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern for all businesses. Securing SQL Server is one of the most important responsibilities of the SQL Server professional.

SQL Server Distilled, Second Edition is a very carefully researched, clearly explained book...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year....
Web Security Basics (Networking)
Web Security Basics (Networking)

In our business world, Web sites have become a powerful marketplace that can capsize a company when attacked by a virus or hacker. Server security is critical to the survival of e-business. While the Internet has improved the way business is conducted, it has also added new rules to play by. With this book, you can take the necessary steps today...

Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)

Southeast Asia has been the breeding ground for many emerging diseases in the past decade, e.g. the avian flu (H5N1) in Hong Kong in 1997, Nipah virus encephalitis in Malaysia in 1998, and, above all, the SARS outbreak in Southern China in 2002. Risk factors contributing to this situation include being economically disadvantaged, sub-standard...

Peptide-Based Cancer Vaccines (Medical Intelligence Unit)
Peptide-Based Cancer Vaccines (Medical Intelligence Unit)

The field of peptide based cancer vaccines has evolved tremendously in the last decade of this century. The exploration on how to apply the peptide knowledge for vaccination purposes began when it was demonstrated that these peptides after being mixed into adjuvants actually induced T cell responses that could prevent virus infections and...

Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Defeating the Hacker: A non-technical guide to computer security
Defeating the Hacker: A non-technical guide to computer security
This is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employees' desks in the office and at home, and the servers which look after your company's email, file storage...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy