-
-
-
-
Avtomatika. Hisoblash texnikasi
-
-
Tibbiyot va sog‘liqni saqlash
-
-
-
The Java Workshop
This book description about Java is a versatile, popular programming language used across a wide range of industries. Learning how to write effective Java code can take your career to the next level, and The Java Workshop will help you do just that. This book is designed to take the pain out of Java coding and teach you everything you need to know to be productive in building real-world software. The Workshop starts by showing you how to use classes, methods, and the built-in Collections API to manipulate data structures effortlessly. You'll dive right into learning about object-oriented programming by creating classes and interfaces and making use of inheritance and polymorphism. After learning how to handle exceptions, you'll study the modules, packages, and libraries that help you organize your code. As you progress, you'll discover how to connect to external databases and web servers, work with regular expressions, and write unit tests to validate your code. You'll also be introduced to functional programming and see how to implement it using lambda functions.
-
Abc of interventional cardiology
It is only 26 years since the first percutaneous transluminal coronary angioplasty (PTCA) was carried out by the pioneering Swiss radiologist, Andreas Greuntzig, heralding the dawn of interventional cardiology. In this short time, interventional cardiology has overcome many limitations and undergone major evolutionary changes—most notably the development of the coronary stent. Worldwide, many thousands of patients now safely undergo percutaneous coronary intervention every day, and the numbers continue to grow. In many countries, the numbers are similar to, or exceed, bypass surgical procedures.
-
Turizm: nazariya va amaliyot
Darslikda ilg'or xorijiy tajribalardan foydalangan holda turizmi sohasini rivojlantirishning nazariy va amaliy asoslari yoritilgan. Xorijiy turizm bozorini rivojlantirish tendensiyalari, mamlakatimizda turizm sohasida amalga oshirilayotgan va davlat siyosatining maqsadli vazifalari aniq misollar yordamida berilgan.
-
The Hacker Playbook 3
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working. This is what The Hacker Playbook 3 - Red Team Edition is all about. By now, we are all familiar with penetration testing, but what exactly is a Red Tea. Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks. How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program.
-
елейная защита и автоматика электроэнергетических систем
Релейная защита является важнейшей и наиболее ответственной составляющей автоматики, применяемой в современных энергетических системах. Она осуществляет автоматическую ликвидацию повреждений и анормальных режимов в электрической части энергосистем, обеспечивая их надежную работу. В настоящее время релейная защита приобретает все большее значение в связи с ростом мощностей электростанций, повышением напряжения электрических сетей. Происходит постепенный переход релейной защиты и автоматики на микропроцессорную базу. В учебнике освещены основные вопросы и характерные особенности релейной защиты и автоматики электроэнергетических систем и промышленных систем электроснабжения. Значительное внимание уделено микропроцессорной релейной защите и быстродействующим устройствам автоматики.
-
Terraform. Up & Running. Writing Infrastructure as Code.
Terraform has become a key player in the DevOps world for defining, launching, and managing infrastructure as code (IaC) across a variety of cloud and virtualization platforms, including AWS, Google Cloud, Azure, and more. This hands-on third edition, expanded and thoroughly updated for version 1.0 and beyond, shows you the fastest way to get up and running with Terraform. Gruntwork cofounder Yevgeniy (Jim) Brikman walks you through code examples that demonstrate Terraform's simple, declarative programming language for deploying and managing infrastructure with a few commands. Veteran sysadmins, DevOps engineers, and novice developers will quickly go from Terraform basics to running a full stack that can support a massive amount of traffic and a large team of developers.
-
Турк хоқонлиги
Энг қадимги аждодларимиз имон-эътиқоди, маданияти, турмуш тарзи ҳақида нима биласиз? Аждодларимиз дини ва ёзуви, кўҳна тарихидан хабардормисиз? Сак-искиф империяси, турк ҳоқонлиги, манқурт хонлиги қай шароитда юзага келди? Муҳтарам китобхон! Агар Сиз нодир битиктошларни, қўлёзмадарни синчиклаб ўрганган истеъдодли ёш олим, филология фанлари доктори Насимхон Раҳмоннинг янги китобини ўқиб чиқсангиз, ана шу саволларга жавоб топасиз.
-
The Essentials of Biostatistics for Physicians, Nurses, and Clinicians
I have taught biostatistics in the health sciences and published a book in 2003 with Wiley on that topic. That book is a textbook for upper - level undergraduates and graduate students in the health science departments at universities. Since coming to the Lankenau Institute 17 months ago, I was tasked to prepare a course in biostatistics for nurses and physicians (particularly the hospital residents and fellows that do medical research). I quickly learned that although the material in my book was relevant, it contained too much material and was not in a digestible form for them.
-
Инвестиции
В учебнике рассматриваются вопросы, раскрывающие сущность инвестиций и инвестиционных отношений в экономической системе: история развития инвестиций и инвестиционной деятельности, финансирование и оценка эффективности инвестиций, инвестиционная система России в условиях интеграции капитала, инвестиционная политика государства, инвестиционная привлекательность в условиях динамичной экономической среды и др. Особое внимание уделено иностранным инвестициям.
-
SQL Injection Strategies
This book descript about SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks.
-
Технология холодной штамповки
Изложены основы технологии листовой штамповки в условиях массового, крупно и мелкосерийного производства. Рассмотрены характеристики применяемых материалов и современные методы испытаний на штампуемость, приведен анализ напряженно-деформированного состояния, возникающего в заготовке при выполнении операций листовой штамповки.
-
Язык программирования C++. Полное руководство
Книга известного эксперта по языку C + + Стенли Липпмана написана в соавторстве с Жози Лажойе, принимавшей активное участие в разработке международного стандарта C ++. Настоящее издание является исчерпывающим руководством для изучения современной версии языка C ++. Авторы рассматривают как основы языка (структуру программы на C ++, использование команд препроцессора и заголовочных файлов), так и более сложные конструкции (исключения, классы, шаблоны функций и классов, перегрузку операторов, множественное наследование и т. п.). Книга содержит большое количество примеров, поясняющих излагаемый материал. Издание предназначено для тех, кто начинает изучение языка C ++, однако и более опытные программисты смогут найти в ней полезные сведения о функционировании сложных конструкций языка, а также описание последних нововведений в стандарт C++.
-
Amaliy mexanika
Darslikning har bir qismida materiallarning yoritishda uning nazariy asoslari berilgan bo`lib hamda namuna sifatida masalalar yechib ko`rsatilgan. Ushbu darslik oliy va o`rta maxsus ta`lim vazirligi tomonidan tasdiqlangan Amaliy mexanika fani dasturi asosida yozilgan bolib, oliy texnik o`quv yurtlari uchun darslik sifatli tavsiya qilingan.
-
Бухгалтерия ҳисоби
Дарсликда бухгалтерия ҳисобининг назарий асослари, корхоналарда активлар, мажбуриятлар, хусусий капитал, даромадлар, харажатлар, молиявий натижалар кўрсаткичлари ҳисобини юритиш, молиявий ҳисоботларни тузиш ва тақдим этиш тартиблари ёритилган.
-
Social Engineering The Science of Human Hacking
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire why hack into something when you could just ask for access. Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks.
-
Современный язык Java. Лямбда-выражения, потоки и функциональное программирование
Преимущество современных приложений — в передовых решениях, включающих микросервисы, реактивные архитектуры и потоковую обработку данных. Лямбда-выражения, потоки данных и долгожданная система модулей платформы Java значительно упрощают их реализацию. Пришло время повысить свою квалификацию и встретить любой вызов во всеоружии! Книга поможет вам овладеть новыми возможностями современных дополнений, таких какAPI Streams и система модулей платформы Java. Откройте для себя новые подходы к конкурентности и узнайте, как концепции функциональности улучшают работу с кодом.