• Ebook Grammar essentials: Part 1

    Ebook Grammar essentials: Part 1

    Ebook Grammar essentials: Part 1 includes the following content: Chapter 1 the right way to write; chapter 2 what is a sentence, anyway? chapter 3 filling out sentence fragments; chapter 4 putting a stop to going on and on; chapter 5 good beginnings, good endings; chapter 6 comma sense; chapter 7 more jobs for commas; chapter 8 getting fancy with semicolons and colons; chapter 9 controlling quotation marks; chapter 10 the mysteries of...

     108 p utehy 27/06/2023 93 1

  • Ebook Grammar essentials: Part 2

    Ebook Grammar essentials: Part 2

    Ebook Grammar essentials: Part 2 includes the following content: Chapter 12 verbs that follow the rules, chapter 13 rebellious verbs, chapter 14 don't be tense about verbs, chapter 15 making subjects and verbs agree, chapter 16 beating the pronoun odds, chapter 17 problem verbs and pronouns, chapter 18 modifier etiquette, chapter 19 tricky words, chapter 20 more tricky words.

     116 p utehy 27/06/2023 66 0

  • Ebook Google hacking for penetration tester: Part 1

    Ebook Google hacking for penetration tester: Part 1

    Ebook Google hacking for penetration tester: Part 1 includes the following content: Chapter 1 google searching basics; chapter 2 advanced operators; chapter 3 Google hacking basics; chapter 4 preassessment; chapter 5 network mapping; chapter 6 locating exploits and finding targets; chapter 7 ten simple security searches that work; chapter 8 tracking down web servers, login portals, and network hardware.

     287 p utehy 27/06/2023 33 1

  • Ebook Google hacking for penetration tester: Part 2

    Ebook Google hacking for penetration tester: Part 2

    Ebook Google hacking for penetration tester: Part 2 includes the following content: Chapter 9 usernames, passwords, and secret stuff, oh my! chapter 10 document grinding and database digging; chapter 11 protecting yourself from google hackers; chapter 12 automating google searches; appendix A professional security testing; appendix B an Introduction to Web Application Security; appendix C Google hacking database.

     242 p utehy 27/06/2023 25 1

  • Ebook Efficiency and complexity in grammars: Part 1

    Ebook Efficiency and complexity in grammars: Part 1

    Efficiency and complexity in grammars addresses a question fundamental to any discussion of grammatical theory and grammatical variation: to what extent can principles of grammar be explained through language use? The book argues that there is a profound correspondence between performance data and the fixed conventions of grammars. Ebook includes all of the following: Chapter 1 introduction; chapter 2 linguistic forms, properties, and...

     165 p utehy 27/06/2023 69 0

  • Ebook Efficiency and complexity in grammars: Part 2

    Ebook Efficiency and complexity in grammars: Part 2

    Ebook Efficiency and complexity in grammars: Part 2 includes all of the following: Chapter 6 minimal forms in complements/adjuncts and proximity; Chapter 7 relative clause and Wh-movement universals; chapter 8 symmetries, asymmetric dependencies, and earliness effects; chapter 9 conclusions.

     157 p utehy 27/06/2023 65 0

  • Ebook Series in Mathematical analysis and applications (Volume 10: Topological degree theory and applications): Part 1

    Ebook Series in Mathematical analysis and applications (Volume 10: Topological degree theory and applications): Part 1

    Ebook Series in Mathematical analysis and applications (Volume 10: Topological degree theory and applications): Part 1 includes the following content: Chapter 1 Brouwer degree theory, chapter 2 Leray Schauder Degree theory, chapter 3 degree theory for set contractive maps, chapter 4 generalized degree theory for a-proper maps.

     108 p utehy 27/06/2023 48 0

  • Ebook Series in Mathematical analysis and applications (Volume 10: Topological degree theory and applications): Part 2

    Ebook Series in Mathematical analysis and applications (Volume 10: Topological degree theory and applications): Part 2

    Ebook Series in Mathematical analysis and applications (Volume 10: Topological degree theory and applications): Part 2 includes the following content: Chapter 5 coincidence degree theory, chapter 6 degree theory for monotone-type maps, chapter 7 fixed point index theory, chapter 8 references.

     111 p utehy 27/06/2023 53 0

  • Ebook Developing grammar in context: Part 1

    Ebook Developing grammar in context: Part 1

    Ebook Developing grammar in context offers a learner-centred approach to grammar study for intermediate level students. Developing Grammar in Context provides clear explanations and lively practice focusing on key grammar areas. Using spoken and written examples drawn from the Cambridge International Corpus, Developing Grammar in Context will help learners consolidate and deepen their understanding of how English really works. This edition,...

     183 p utehy 27/06/2023 63 0

  • Ebook Developing grammar in context: Part 2

    Ebook Developing grammar in context: Part 2

    Ebook Developing grammar in context (intermediate) is a grammar reference and practice book which can be used by learners for self-study, or can be used in class. A basic premise of the book is that learners need to meet examples of a grammatical structure in an authentic context, and think about its use, before they try to use it for themselves.

     151 p utehy 27/06/2023 66 0

  • Ebook The Database hacker’s handbook: Defending database servers – Part 1

    Ebook The Database hacker’s handbook: Defending database servers – Part 1

    Ebook The Database hacker’s handbook: Defending database servers – Part 1 presents the following main contents: Chapter 1 Why Care About Database Security? Chapter 2 The Oracle Architecture, Chapter 3 Attacking Oracle, Chapter 4 Oracle Moving Further into the Network, Chapter 5 Securing Oracle, Chapter 6 IBM DB2 Universal Database, Chapter 7 DB2 Discovery, Attack, and Defense, Chapter 8 Attacking DB2, Chapter 9 Securing DB2, Chapter 10 The...

     280 p utehy 27/06/2023 23 0

  • Ebook The Database hacker’s handbook: Defending database servers – Part 2

    Ebook The Database hacker’s handbook: Defending database servers – Part 2

    Ebook The Database hacker’s handbook: Defending database servers – Part 2 presents the following main contents: Chapter 17 MySQL Architecture; Chapter 18 MySQL Discovery, Attack, and Defense; Chapter 19 MySQL Moving Further into the Network; Chapter 20 Securing MySQL; Chapter 21 Microsoft SQL Server Architecture; Chapter 22 SQL Server Exploitation, Attack, and Defense; Chapter 23 Securing SQL Server; Chapter 24 The PostgreSQL Architecture;...

     246 p utehy 27/06/2023 22 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=utehy