Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Digital Design: Principles and Practices (4th Edition, Book only)
Digital Design: Principles and Practices (4th Edition, Book only)

Appropriate for a first or second course in digital logic design. Blends academic precision and practical experience in an authoritative introduction to basic principles of digital design and practical requirements. With over 30 years of experience in both industrial and university settings, the author covers the most widespread logic design...

Stem Cell and Gene-Based Therapy: Frontiers in Regenerative Medicine
Stem Cell and Gene-Based Therapy: Frontiers in Regenerative Medicine

Regenerative medicine – stem cell and gene-based therapy – offers a new approach for restoring function of damaged organs and tissues. This is the first book to cover the major new aspects and field of regenerative medicine. This title is therefore a timely addition to the literature. It brings together the major approaches to...

A History of Medicine, Second Edition
A History of Medicine, Second Edition

Stressing major themes in the history of medicine, this Second Edition stimulates further exploration of the events, methodologies, and theories that shaped medical practices in decades past and in modern clinical practice-highlighting the practices of civilizations around the world, as well as the research of pioneering scientists and...

Sun Certified Security Administrator for Solaris 9 & 10 Study Guide
Sun Certified Security Administrator for Solaris 9 & 10 Study Guide

Get the book that shows you not only what--but how--to study

  • Complete coverage of all official exam objectives
  • Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off
  • Real-world exercises--Step-by-step instruction...
Reason 3 for Windows and Macintosh : Visual QuickStart Guide
Reason 3 for Windows and Macintosh : Visual QuickStart Guide
Combining pristine sound quality with a comfortably retro-styled virtual rack (including a polyphonic synthesizer, mixing console, sampler, and drum machine), Reason has won legions of fans since its introduction. Now, everyone is singing its praises -- from bands like Nine Inch Nails and Prodigy to video producers. Here to show you why is the...
Essentials of Child Psychopathology (Essentials of Behavioral Science Series)
Essentials of Child Psychopathology (Essentials of Behavioral Science Series)
The only concise, comprehensive overview of child psychopathology covering theory, assessment, and treatment as well as issues and trends

Essentials of Child Psychopathology provides students and professionals with a comprehensive overview of critical conceptual issues in child and adolescent psychopathology. The text covers the major theories,...

Podcasting: Do It Yourself Guide
Podcasting: Do It Yourself Guide
It's your show, and you can do what you want

Got something to tell the world? Want unlimited listening options? Podcasting makes it happen. It's the hottest communication trend of the twenty-first century, and one of the first guys to jump on board is ready to get you started. Todd helps you choose software, subscribe to the best podcasts,...

Enhancing CAD Drawings with Photoshop
Enhancing CAD Drawings with Photoshop
"If you're an architect looking to get the most out of Photoshop, look no further! Enhancing CAD Drawings with Photoshop is a killer book."
George Omura, Author, Mastering AutoCAD 2005 and AutoCAD LT 2005

Bring Your CAD Drawings to Life Using Artistic Photoshop
...
Topology for Computing (Cambridge Monographs on Applied and Computational Mathematics)
Topology for Computing (Cambridge Monographs on Applied and Computational Mathematics)
Written by a computer scientist for computer scientists, this book teaches topology from a computational point of view, and shows how to solve real problems that have topological aspects involving computers. Such problems arise in many areas, such as computer graphics, robotics, structural biology, and chemistry. The author starts from the basics...
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Result Page: Previous 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy