 |
|
 Use of Force: A Thriller (The Scot Harvath Series)
“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy
From #1 New York Times bestselling author Brad Thor.
As a storm rages across the Mediterranean Sea, a... |  |  Peripheral Arterial Disease: Diagnosis and Treatment (Contemporary Cardiology)
Recognized experts comprehensively review the clinical, surgical, radiological, and scientific aspects of atherosclerotic peripheral arterial disease (PAD), including endovascular, gene, and drug therapies. In their far-ranging discussions, the authors examine in depth the risk factors and antiplatelet therapies for PAD patients at high risk... |  |  Linux Server Security: Hack and Defend
Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server... |
|
 The Lost Boyz: A Dark Side of Graffiti
At age 14, author Justin Rollins went from being a bullied child to the leader of The Warriorz, a group of London street kids involved in graffiti tagging and other crimes, including a series of violent encounters. Eventually given a substantial custodial sentence for an attack with a meat cleaver in the London Underground, Rollins became... |  |  Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Expecting to relax during a routine flight home, I casually glanced through
the contents of the airline’s magazine and practically suffered a heart attack.
The first feature article was entitled, “How to Live Forever”! Believing for
a moment that Becoming Immortal had been scooped, I tore through the
magazine... |  |  Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore... |
|
|
 The Network Security Test Lab: A Step-by-Step Guide
The ultimate hands-on guide to IT security and proactivedefense
The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment... |  |  Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement... |  |  Warfare and Weaponry in Dynastic Egypt
Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as... |
|
| Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |