You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append it as an afterthought. That's the point of Secure Coding in C and C++. In careful detail, this book shows software developers how to build high-quality systems that are less vulnerable to costly and even catastrophic attack. It's a book that every developer should read before the start of any serious project." --Frank Abagnale, author, lecturer, and leading consu...
The purpose of this series of volumes is to present a comprehensive view of the complications that result from the use of acceptable diagnostic and therapeutic procedures. Individual volumes will deal with iatrogenic complications involving (1) the alimentary system, (2) the urinary system, (3) the respiratory and cardiac systems, (4) the skeletal system and (5) the pediatric patient. The term iatrogenic, derived from two Greek words, means physician-induced. Originally, it applied only to psychiatric disorders generated in the patient by autosuggestion, based on misinterpretation of the doctor's attitude and com ments. As clinically used, it now pertains to the inadvertent side-effects and ...
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities. Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow’s attacks, not just today’s. Drawing on the CERT...
This volume covers all aspects of the antibiotic discovery and development process through Phase II/III. The contributors, a group of highly experienced individuals in both academics and industry, include chapters on the need for new antibiotic compounds, strategies for screening for new antibiotics, sources of novel synthetic and natural antibiotics, discovery phases of lead development and optimization, and candidate compound nominations into development. Beyond discovery , the handbook will cover all of the studies to prepare for IND submission: Phase I (safety and dose ranging), progression to Phase II (efficacy), and Phase III (capturing desired initial indications). This book walks the reader through all aspects of the process, which has never been done before in a single reference. With the rise of antibiotic resistance and the increasing view that a crisis may be looming in infectious diseases, there are strong signs of renewed emphasis in antibiotic research. The purpose of the handbook is to offer a detailed overview of all aspects of the problem posed by antibiotic discovery and development.
This second edition provides new and updated methods and techniques for identification of drug target, binding sites prediction, high- throughput virtual screening, lead discovery and optimization, conformational sampling, prediction of pharmacokinetic properties using computer-based methodologies. Chapters also focus on the application of the latest artificial intelligence technologies for computer aided drug discovery. Written in the format of the highly successful Methods in Molecular Biology series, each chapter includes an introduction to the topic, lists necessary methods, includes tips on troubleshooting and known pitfalls, and step-by-step, readily reproducible protocols. Authoritative and cutting-edge, Computational Drug Discovery and Design, Second Edition aims to effectively utilize computational methodologies in discovery and design of novel drugs.
Looks at the history of radio broadcasting as an aspect of American culture, and discusses social tensions, radio formats, and the roles of African Americans and women
Machine Translation and the Information Soup! Over the past fty years, machine translation has grown from a tantalizing dream to a respectable and stable scienti c-linguistic enterprise, with users, c- mercial systems, university research, and government participation. But until very recently, MT has been performed as a relatively distinct operation, so- what isolated from other text processing. Today, this situation is changing rapidly. The explosive growth of the Web has brought multilingual text into the reach of nearly everyone with a computer. We live in a soup of information, an increasingly multilingual bouillabaisse. And to partake of this soup, we can use MT systems together with more and more tools and language processing technologies|information retrieval engines, - tomated text summarizers, and multimodal and multilingual displays. Though some of them may still be rather experimental, and though they may not quite t together well yet, it is clear that the future will o er text manipulation systems that contain all these functions, seamlessly interconnected in various ways.
Critical Code contemplates Department of Defense (DoD) needs and priorities for software research and suggests a research agenda and related actions. Building on two prior booksâ€"Summary of a Workshop on Software Intensive Systems and Uncertainty at Scale and Preliminary Observations on DoD Software Research Needs and Prioritiesâ€"the present volume assesses the nature of the national investment in software research and, in particular, considers ways to revitalize the knowledge base needed to design, produce, and employ software-intensive systems for tomorrow's defense needs. Critical Code discusses four sets of questions: To what extent is software capability significant for the DoD? Is it becoming more or less significant and strategic in systems development? Will the advances in software producibility needed by the DoD emerge unaided from industry at a pace sufficient to meet evolving defense requirements? What are the opportunities for the DoD to make more effective use of emerging technology to improve software capability and software producibility? In which technology areas should the DoD invest in research to advance defense software capability and producibility?
Accompanying CD-ROM contains a MATLAB tutorial.