Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth
You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth

Janine Driver was trained as a lie detection expert for the ATF, FBI, and the CIA and is a New York Times bestselling author (You Say More Than You Think). Now she makes a powerful and incontrovertible declaration: You Can’t Lie to Me.  Driver—who is known in professional circles as “the...

Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 (Penguin Books)
Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 (Penguin Books)
Winner of the 2005 Pulitzer Prize

The explosive first-hand account of America's secret history in Afghanistan


With the publication of Ghost Wars, Steve Coll became not only a Pulitzer Prize winner, but also the expert on the rise of the Taliban, the emergence of Bin Laden, and the secret
...
Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Leadership Principles for Project Success
Leadership Principles for Project Success
This book is about project success. It reveals a secret for project success: effective project leadership. It shows where pure project management falls short and why project leadership is the decisive factor for project success. It outlines five simple yet powerful leadership principles which, if applied systematically, can help...
Use of Force: A Thriller (The Scot Harvath Series)
Use of Force: A Thriller (The Scot Harvath Series)

“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy

From #1 New York Times bestselling author Brad Thor.

As a storm rages across the Mediterranean Sea, a
...

Hyperformance: Using Competitive Intelligence for Better Strategy and Execution
Hyperformance: Using Competitive Intelligence for Better Strategy and Execution

Effective strategies for outsmarting the competition and driving better bottom-line results

In this groundbreaking book, T.J. Waters has turned his experience collecting and analyzing competitive intelligence for the CIA into effective strategies for businesses wanting to stay on the leading edge of their industries. The...

Robert Ludlum's The Bourne Legacy
Robert Ludlum's The Bourne Legacy

In Robert Ludlum's ground-breaking career, no other character so captured and held the world's imagination as Jason Bourne. He appeared in three of Robert Ludlum's own #1 bestselling novels - The Bourne Identity, The Bourne Supremacy, and The Bourne Ultimatum - and they remain amongst Ludlum's most-read...

Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Result Page: 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy