Home | Amazing | Today | Tags | Publishers | Years | Search 
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to...

The Oxford Handbook of Philosophy of Time (Oxford Handbooks)
The Oxford Handbook of Philosophy of Time (Oxford Handbooks)

As the study of time has flourished in the physical and human sciences, the philosophy of time has come into its own as a lively and diverse area of academic research. Philosophers investigate not just the metaphysics of time, and our experience and representation of time, but the role of time in ethics and action, and philosophical issues in...

Advances in Structural Engineering: Materials, Volume Three
Advances in Structural Engineering: Materials, Volume Three

The book presents research papers presented by academicians, researchers, and practicing structural engineers from India and abroad in the recently held Structural Engineering Convention (SEC) 2014 at Indian Institute of Technology Delhi during 22 – 24 December 2014. The book is divided into three volumes and encompasses...

Lactic Acid Bacteria: Biodiversity and Taxonomy
Lactic Acid Bacteria: Biodiversity and Taxonomy

The lactic acid bacteria (LAB) are a group of related micro-organisms that are enormously important in the food and beverage industries, preventing food spoilage and extending shelf life. This is the first reference that provides a much-needed and comprehensive account of the current knowledge of LAB, detailing the taxonomy, biochemistry,...

Handbook of Compliant Mechanisms
Handbook of Compliant Mechanisms

A fully illustrated reference book giving an easy-to-understand introduction to compliant mechanisms

A broad compilation of compliant mechanisms to give inspiration and guidance to those interested in using compliant mechanisms in their designs, the Handbook of Compliant Mechanisms includes graphics and descriptions of many...

Learning Pentesting for Android Devices
Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...

Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map
Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map

Understanding your company’s data has never been easier than with Microsoft’s new Power BI package for Excel 2013. Consisting of four powerful tools—Power Pivot, Power View, Power Query and Power Maps—Power BI makes self-service business intelligence a reality for a wide range of users, bridging the traditional gap...

Managing Your Business: Learn What You Need in 2 Hours (A Crash Course for Entrepreneurs)
Managing Your Business: Learn What You Need in 2 Hours (A Crash Course for Entrepreneurs)

You may be a one-person band, the only manager in your company, or the manager of other managers in a larger company. Whatever the size of your business, having a strong grounding in the thinking and practices of effective managers and leaders will make you more capable. In this essential guide, you'll learn how to:

Engineering Mathematics
Engineering Mathematics

A practical introduction to the core mathematics required for engineering study and practice

Now in its seventh edition, Engineering Mathematics is an established textbook that has helped thousands of students to succeed in their exams.

John Bird's approach is based on worked examples and interactive problems. This...

Modeling and Control of a Large Nuclear Reactor: A Three-Time-Scale Approach (Lecture Notes in Control and Information Sciences)
Modeling and Control of a Large Nuclear Reactor: A Three-Time-Scale Approach (Lecture Notes in Control and Information Sciences)

Control analysis and design of large nuclear reactors requires a suitable mathematical model representing the steady state and dynamic behavior of the reactor with reasonable accuracy. This task is, however, quite challenging because of several complex dynamic phenomena existing in a reactor. Quite often, the models developed would be of...

Planning and Designing Effective Metrics
Planning and Designing Effective Metrics

Metrics are a hot topic. Executive leadership, boards of directors, management, and customers are all asking for data-based decisions. As a result, many managers, professionals, and change agents are asked to develop metrics, but have no clear idea of how to produce meaningful ones. Wouldn’t it be great to have a fast, simple...

The Routledge Guidebook to Aristotle's Nicomachean Ethics (The Routledge Guides to the Great Books)
The Routledge Guidebook to Aristotle's Nicomachean Ethics (The Routledge Guides to the Great Books)

Written by one of the most important founding figures of Western philosophy, Aristotle’s Nicomachean Ethics represents a critical point in the study of ethics which has influenced the direction of modern philosophy. The Routledge Guidebook to Aristotle’s Nicomachean Ethics introduces the major themes in...

Result Page: Previous 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy