Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Few events have had a more profound impact on the social and cultural upheavals of the Sixties than the psychedelic revolution spawned by the spread of LSD. This book for the first time tells the full and astounding story—part of it hidden till now in secret Government files—of the role the mind-altering drug played in our recent...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

The Semiotic Engineering of Human-Computer Interaction (Acting with Technology)
The Semiotic Engineering of Human-Computer Interaction (Acting with Technology)
In The Semiotic Engineering of Human-Computer Interaction, Clarisse Sieckenius de Souza proposes an account of HCI that draws on concepts from semiotics and computer science to investigate the relationship between user and designer. Semiotics is the study of signs, and the essence of semiotic engineering is the communication between...
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Drawing on a wealth of new evidence from all sides, Triumph Forsaken overturns most of the historical orthodoxy on the Vietnam War. Through the analysis of international perceptions and power, it shows that South Vietnam was a vital interest of the United States. The book provides many new insights into the overthrow of Ngo Dinh Diem in 1963 and...
American Breakdown: The Trump Years and How They Befell Us
American Breakdown: The Trump Years and How They Befell Us
How Trump got to the Oval Office—and how both parties and the mainstream media are keeping him there

Donald Trump’s residency in the White House is not an accident of American history, and it can’t be blamed on a single cause. In American Breakdown, David Bromwich provides an essential analysis of...

Network Security Bible
Network Security Bible
If you need a solid foundation in network security, this is it

Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how
...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the...
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

IT Compliance and Controls: Best Practices for Implementation
IT Compliance and Controls: Best Practices for Implementation
Praise for IT Compliance and Controls

"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen."
—Dr. Richard Reiner, founder,
...

Result Page: 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy