Stiff is an oddly compelling, often hilarious exploration of the strange lives of our bodies postmortem. For two thousand years, cadavers-some willingly, some unwittingly-have been involved in science’s boldest strides and weirdest undertakings. In this fascinating account, Mary Roach visits the good deeds of cadavers over the centuries and tells the engrossing story of our bodies when we are no longer with them.
Stiff : The Curious Lives of Human Cadavers
UGX 40,000
- Paperback | 320 pages
- 140 x 211 x 23mm | 270g
- 22 Jun 2004
- WW Norton & Co
- New York, United States
- English
- Reprint
- 0393324826
- 9780393324822
- 67,369
Customer Reviews
There are no reviews yet.
Vendor Information
- Vendor: bitabo.admin
- No ratings found yet!
Guinness World Records 2021
UGX 79,000- Hardback | 256 pages
- 229 x 302 x 20mm | 1,161g
- 06 Oct 2020
- Guinness World Records
- New York
- English
- Illustrations, unspecified
- 1913484009
- 9781913484002
- 345
UGX 80,000Hello, World! Dinosaurs
UGX 26,000- Board book | 26 pages
- 178 x 178 x 17.78mm | 294.84g
- 13 Feb 2018
- Random House USA Inc
- Random House USA Children’s Books
- New York, United States
- English
- Full colour
- 152471934X
- 9781524719340
- 58,416
One Up On Wall Street : How To Use What You Already Know To Make Money In The Market
UGX 49,000- Paperback | 304 pages
- 140 x 214 x 18mm | 247g
- 21 Aug 2000
- SIMON & SCHUSTER
- New York, United States
- English
- ed
- index
- 0743200403
- 9780743200400
- 256
How to Fail at Flirting : sexy, heart-warming and emotional – the perfect romcom for 2020
UGX 47,000- Paperback | 352 pages
- 124 x 196 x 26mm | 243g
- 01 Dec 2020
- Little, Brown Book Group
- PIATKUS BOOKS
- London, United Kingdom
- English
- 0349428611
- 9780349428611
- 17,694
UGX 48,000How to Hack Like a LEGEND: A hacker’s tale breaking into a secretive offshore company Paperback – 11 April 2018 by Sparc Flow (Author)
UGX 96,000This is the story of a hacker who met his match while breaking into a company: machine learning, behavioral analysis, artificial intelligence… Most hacking tools simply crash and burn in such a hostile environment. What is a hacker to do when facing such a fully equipped opponent?
Note: the source code of all custom attack payloads are provided and explained thoroughly in the book.Cybersecurity at its best We start by building a resilient C2 infrastructure using cloud providers, HTTP redirectors and SSH tunnels. The idea is to hide behind an array of disposable machines that we can renew in a matter of seconds to completely change our internet footprint. We then set up step-by-step a phishing platform: fake website, postfix server, DKIM signing, SPF and DMARC.
The Art of intrusion Instead of hacking directly our mark(an offshore company), we target one of their suppliers that we identified using OSINT techniques. We collect a couple of passwords thanks to our phishing platform and leverage the remote Citrix access to put our first foot inside. We bypass Applocker and Constrained Language on PowerShell to achieve code execution, then start our Active Directory reconnaissance.
Be the first to review “Stiff : The Curious Lives of Human Cadavers”