Browse Results

Showing 99,651 through 99,675 of 100,000 results

Finite-Element Modelling of Structural Concrete: Short-Term Static and Dynamic Loading Conditions

by Michael D. Kotsovos

A Powerful Tool for the Analysis and Design of Complex Structural ElementsFinite-Element Modelling of Structural Concrete: Short-Term Static and Dynamic Loading Conditions presents a finite-element model of structural concrete under short-term loading, covering the whole range of short-term loading conditions, from static (monotonic and cyclic) to

Soil and Water Conservation Handbook: Policies, Practices, Conditions, and Terms

by Paul W. Unger

Save time and effort with this practical guide to all aspects of water and soil conservation Soil and Water Conservation Handbook is a concise, compact encyclopedia of the policies, practices, conditions, and terms related to soil and/or water conservation. This handy A-to-Z guide contains descriptions of more than 700 entries, presente

Risk-Based Analysis for Environmental Managers

by Kurt A. Frantzen

All corporations must perform evaluations to define the risks to public health and the environment. Your corporation can get the edge by evaluating risk with a process that begins with the "end-in-mind" for the property and that concludes with a cogently communicated argument that addresses the issues. With this in mind, Risk-Based Analysis for Env

Biofilms: Investigative Methods and Applications

by Hans-Curt Flemming Ulrich Szewzyk Thomas Griebe

Until now, techniques for studying biofilms- the cellular colonies that live in drinking water systems, wastewater operations, even ground and surface water- have been limited. Yet during the last decade, biofilms have become a critical element in water quality preservation systems, a key component of wastewater treatment biological reactions and t

Numerical Modeling of Water Waves

by Pengzhi Lin

Modelling large-scale wave fields and their interaction with coastal and offshore structures has become much more feasible over the last two decades with increases in computer speeds. Wave modelling can be viewed as an extension of wave theory, a mature and widely published field, applied to practical engineering through the use of computer tools.

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

by Fotios Chantzis Ioannis Stais Paulino Calderon Evangelos Deirmentzoglou Beau Woods

The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk. The book begins by walking you through common threats and a threat modeling framework. You&’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you&’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks. You&’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems. You&’ll also learn how to: • Write a DICOM service scanner as an NSE module • Hack a microcontroller through the UART and SWD interfaces • Reverse engineer firmware and analyze mobile companion apps • Develop an NFC fuzzer using Proxmark3 • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill The tools and devices you&’ll use are affordable and readily available, so you can easily practice what you learn. Whether you&’re a security researcher, IT team member, or hacking hobbyist, you&’ll find Practical IoT Hacking indispensable in your efforts to hack all the things REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming

Foundations of Information Security: A Straightforward Introduction

by Jason Andress

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You'll also learn the basics of topics like:Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication processThe principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificatesThe laws and regulations that protect systems and dataAnti-malware tools, firewalls, and intrusion detection systemsVulnerabilities such as buffer overflows and race conditionsA valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.

Trauma Through a Child's Eyes: Awakening the Ordinary Miracle of Healing

by Peter A. Levine Ph.D. Maggie Kline

What parents, educators, and health professionals can do to recognize, prevent, and heal childhood trauma, from infancy through adolescence—by the author of Waking the TigerTrauma can result not only from catastrophic events such as abuse, violence, or loss of loved ones, but from natural disasters and everyday incidents like auto accidents, medical procedures, divorce, or even falling off a bicycle. At the core of this book is the understanding of how trauma is imprinted on the body, brain, and spirit—often resulting in anxiety, nightmares, depression, physical illnesses, addictions, hyperactivity, and aggression. Rich with case studies and hands-on activities, Trauma Through a Child&’s Eyes gives insight into children&’s innate ability to rebound with the appropriate support, and provides their caregivers with tools to overcome and prevent trauma.&“Trauma Through A Child&’s Eyes . . . creates its own mold in a way that everyone concerned with the health and happiness of children will be grateful for.&” —Gabor Maté, MD, author of Hold On to Your Kids

Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.

by Matt Hand

EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it.Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you&’ll learn that EDR is not a magical black box—it&’s just a complex software application built around a few easy-to-understand components.The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.

DEN Volume 3: Children of Fire (DEN)

by Richard Corben

The third volume presenting the long-out-print masterpiece Den, by fantasy legend Richard Corben!This special edition collects the third volume of the long out-of-print Den, and also features bonus material, art pages restored by long-time Corben collaborator José Villarrubia, re-lettered by Nate Piekos of Blambot, and an introduction by Matt Kindt, all presented in a gorgeous hardcover with a dust jacket.Aliens flee their planet after a monster attack and crash-land near a sorcerer&’s castle in Neverwhere. They must fight for survival and protect their egg and future kin at all costs from the many beasts, pirates, and other threats to their safety.Den: Children of Fire is the next book in a series of deluxe graphic novels from renowned creator Richard Corben&’s library to be published by Dark Horse Comics.FOR MATURE READERS&“The artist I most want to aspire to is Richard Corben. His style is visual and it tells the story just as you see it... ...my favorite is Corben. I love everything he does, I love his stuff ...he&’s an amazing artist.&”—Guillermo del Toro"Richard Corben stands among us like an extraterrestrial peak. He has sat in his throne a long time, above the moving and multi-colored field of world comics, like an effigy of the leader, a strange monolith, a sublime visitor, a solitary enigma"—Moebius&“Mr. Richard Corben... a genuine giant of his chosen medium.&”—Alan MooreWell known for his legendary fantasy underground masterpieces published by Fantagor Press as well as Heavy Metal, Richard Corben&’s work has been recognized internationally having been awarded one of the most prestigious recognitions in comics literature the Grand Prix at Angoulême as well having been inducted into the Will Eisner Award Hall of Fame.

War and Peace: A Historical Novel, Volume 2 (Modern Library Classics)

by Leo Tolstoy

Nominated as one of America&’s best-loved novels by PBS&’s The Great American ReadOften called the greatest novel ever written, War and Peace is at once an epic of the Napoleonic Wars, a philosophical study, and a celebration of the Russian spirit. Tolstoy&’s genius is seen clearly in the multitude of characters in this massive chronicle—all of them fully realized and equally memorable. Out of this complex narrative emerges a profound examination of the individual&’s place in the historical process, one that makes it clear why Thomas Mann praised Tolstoy for his Homeric powers and placed War and Peace in the same category as the Iliad: &“To read him . . . is to find one&’ s way home . . . to everything within us that is fundamental and sane.&”

The Tangled Web: A Guide to Securing Modern Web Applications

by Michal Zalewski

Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world’s top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they’re fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security.You’ll learn how to:–Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization–Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing–Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs–Build mashups and embed gadgets without getting stung by the tricky frame navigation policy–Embed or host user-supplied content without running into the trap of content sniffingFor quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you’re most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.

Human Longevity: Omega-3 Fatty Acids, Bioenergetics, Molecular Biology, and Evolution

by Raymond C. Valentine David L. Valentine

More than 7 billion people inhabit the earth and all of them are subject to aging. This book is aimed at persons interested in a molecular explanation of how our cells age. Human Longevity: Omega-3 Fatty Acids, Bioenergetics, Molecular Biology, and Evolution is built on the proposition that we age as our mitochondria age. It suggests a revised vers

Handbook of Functional Beverages and Human Health (Nutraceutical Science and Technology)

by Fereidoon Shahidi Cesarettin Alasalvar

Handbook of Functional Beverages and Human Health provides potential applications and new developments in functional beverages, nutraceuticals, and health foods. In addition to serving as a reference manual, it summarizes the current state of knowledge in key research areas and contains novel ideas for future research and development. Additionally,

Dermatotoxicology

by Klaus-Peter Wilhelm Hongbo Zhai Howard I. Maibach

The foundational reference in dermal toxicology, this classic text has been completely revised to bring it up to date in the new Eighth Edition, with almost a third of its chapters being newly added. The structure of the text has also been reorganized to enable easier location of a topic of interest. With contributions from leading international ex

Essential Oil-Bearing Grasses: The genus Cymbopogon

by Anand Akhila

When enjoying a southeast asian soup or cup of herbal tea, we are really savoring the flavor of lemongrass. Similarly, the sweet aroma of mosquito-repelling lotions comes from the citronella oil present in them. Fine perfumes, candles, and herbal pillows with the pleasing smell of rose are often in fact scented with palmarosa. Providing an in-depth

The Unified Process Construction Phase: Best Practices in Implementing the UP

by Scott Ambler

Is the Unified Process the be all and end all standard for developing object-oriented component-based software? This book focuses on the design and implementation skeletal versions of systems for purposes of testing early in the life cycle for quality control.

Handbook of Spatial Epidemiology (Chapman & Hall/CRC Handbooks of Modern Statistical Methods)

by Andrew B. Lawson Sudipto Banerjee Robert P. Haining María Dolores Ugarte

Handbook of Spatial Epidemiology explains how to model epidemiological problems and improve inference about disease etiology from a geographical perspective. Top epidemiologists, geographers, and statisticians share interdisciplinary viewpoints on analyzing spatial data and space-time variations in disease incidences. These analyses can provide imp

The Hilbert-Huang Transform in Engineering

by Norden Huang Nii O. Attoh-Okine

Data used to develop and confirm models suffer from several shortcomings: the total data is too limited, the data are non-stationary, and the data represent nonlinear processes. The Hilbert-Huang transform (HHT) is a relatively new method that has grown into a robust tool for data analysis and is ready for a wide variety of applications.Thi

Get Through Final FRCA: MCQs (Get Through)

by Nawal Bahal Mubeen Khan Aliki Manoras

With more than 950 questions, and containing diagrams found in the actual exam, this book encompasses the syllabus of the Final FRCA as set by the Royal College of Anaesthetists, including five complete examinations, each comprising of 90 MCQs. Questions have been modelled on actual exam questions so that they accurately reflect the style and level

A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis (Chapman & Hall/CRC Applied Algorithms and Data Structures series)

by Anne Benoit Yves Robert Frédéric Vivien

Presenting a complementary perspective to standard books on algorithms, A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis provides a roadmap for readers to determine the difficulty of an algorithmic problem by finding an optimal solution or proving complexity results. It gives a practical treatment of algorithmic complexity and guides readers in solving algorithmic problems.Divided into three parts, the book offers a comprehensive set of problems with solutions as well as in-depth case studies that demonstrate how to assess the complexity of a new problem. Part I helps readers understand the main design principles and design efficient algorithms. Part II covers polynomial reductions from NP-complete problems and approaches that go beyond NP-completeness. Part III supplies readers with tools and techniques to evaluate problem complexity, including how to determine which instances are polynomial and which are NP-hard. Drawing on the authors’ classroom-tested material, this text takes readers step by step through the concepts and methods for analyzing algorithmic complexity. Through many problems and detailed examples, readers can investigate polynomial-time algorithms and NP-completeness and beyond.

Multimedia over Cognitive Radio Networks: Algorithms, Protocols, and Experiments

by Fei Hu Sunil Kumar

With nearly 7 billion mobile phone subscriptions worldwide, mobility and computing have become pervasive in our society and business. Moreover, new mobile multimedia communication services are challenging telecommunication operators. To support the significant increase in multimedia traffic-especially video-over wireless networks, new technological

The Quiet Americans: Four CIA Spies at the Dawn of the Cold War--a Tragedy in Three Acts

by Scott Anderson

From the bestselling author of Lawrence in Arabia—the gripping story of four CIA agents during the early days of the Cold War—and how the United States, at the very pinnacle of its power, managed to permanently damage its moral standing in the world. &“Enthralling … captivating reading.&” —The New York Times Book Review At the end of World War II, the United States was considered the victor over tyranny and a champion of freedom. But it was clear—to some—that the Soviet Union was already seeking to expand and foment revolution around the world, and the American government&’s strategy in response relied on the secret efforts of a newly formed CIA. Chronicling the fascinating lives of four agents, Scott Anderson follows the exploits of four spies: Michael Burke, who organized parachute commandos from an Italian villa; Frank Wisner, an ingenious spymaster who directed actions around the world; Peter Sichel, a German Jew who outwitted the ruthless KGB in Berlin; and Edward Lansdale, a mastermind of psychological warfare in the Far East. But despite their lofty ambitions, time and again their efforts went awry, thwarted by a combination of ham-fisted politicking and ideological rigidity at the highest levels of the government.

Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners

by Al Sweigart

Learn how to code while you write programs that effortlessly perform useful feats of automation!The second edition of this international fan favorite includes a brand-new chapter on input validation, Gmail and Google Sheets automations, tips for updating CSV files, and more.If you've ever spent hours renaming files or updating spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you? Automate the Boring Stuff with Python, 2nd Edition teaches even the technically uninclined how to write programs that do in minutes what would take hours to do by hand—no prior coding experience required!This new, fully revised edition of Al Sweigart&’s bestselling Pythonic classic, Automate the Boring Stuff with Python, covers all the basics of Python 3 while exploring its rich library of modules for performing specific tasks, like scraping data off the Web, filling out forms, renaming files, organizing folders, sending email responses, and merging, splitting, or encrypting PDFs. There&’s also a brand-new chapter on input validation, tutorials on automating Gmail and Google Sheets, tips on automatically updating CSV files, and other recent feats of automations that improve your efficiency.Detailed, step-by-step instructions walk you through each program, allowing you to create useful tools as you build out your programming skills, and updated practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks. Boring tasks no longer have to take to get through—and neither does learning Python!

Getting Started with FPGAs: Digital Circuit Design, Verilog, and VHDL for Beginners

by Russell Merrick

Skip the complexity and learn to program FPGAs the easy way through this hands-on, beginner-friendly introduction to digital circuit design with Verilog and VHDL.Whether you have been toying with field programmable gate arrays (FPGAs) for years or are completely new to these reprogrammable devices, this book will teach you to think like an FPGA engineer and develop reliable designs with confidence.Through detailed code examples, patient explanations, and hands-on projects, Getting Started with FPGAs will actually get you started. Russell Merrick, creator of the popular blog Nandland.com, will guide you through the basics of digital logic, look-up tables, and flip-flops, as well as high-level concepts like state machines. You&’ll explore the fundamentals of the FPGA build process including simulation, synthesis, and place and route.You&’ll learn about key FPGA primitives, such as DSP blocks and PLLs, and examine how FPGAs handle math operations and I/O.Code examples are provided in both Verilog and VHDL, making the book a valuable resource no matter your language of choice. You&’ll discover how to:Implement common design building blocks like multiplexers, LFSRs, and FIFOsCross between clock domains without triggering metastable conditions or timing errorsAvoid common pitfalls when performing mathTransmit and receive data at lightning speeds using SerDesWrite testbench code to verify your designs are workingWith this accessible, hands-on guide, you&’ll be creating your own functional FPGA projects in no time. Getting started with FPGAs has never been easier.

Refine Search

Showing 99,651 through 99,675 of 100,000 results