Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
From Pulitzer Prize finalist Annie Jacobsen, the untold USA Today bestselling story of the CIA's secret paramilitary units.


Surprise . . . your target. Kill . . . your enemy. Vanish . . . without a trace.


When
...
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

Essentials of Payroll: Management and Accounting
Essentials of Payroll: Management and Accounting

ESSENTIALS OF PAYROLL

Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this handy and concise paperback will help you stay up to date on the newest thinking, strategies, developments, and technologies in payroll.

"Steven has done it again. Payroll...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
"An excellent, ground breaking book, highly recommended."--Books-On-Line

The American ENIAC is customarily regarded as having been the starting point of electronic computation. This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during
...
Accounting Best Practices (Wiley Best Practices)
Accounting Best Practices (Wiley Best Practices)

A revised and updated Second Edition of the guide that lets you turn your adequate practices into Best Practices

Accounting Best Practices provides you with the most advanced techniques and strategies available today to help your business cut costs and improve accounting operations–regardless of your company’s size or...

Auditing Information Systems
Auditing Information Systems

Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly...

 
   
Result Page: 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy