Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Few events have had a more profound impact on the social and cultural upheavals of the Sixties than the psychedelic revolution spawned by the spread of LSD. This book for the first time tells the full and astounding story—part of it hidden till now in secret Government files—of the role the mind-altering drug played in our recent...
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

The Semiotic Engineering of Human-Computer Interaction (Acting with Technology)
The Semiotic Engineering of Human-Computer Interaction (Acting with Technology)
In The Semiotic Engineering of Human-Computer Interaction, Clarisse Sieckenius de Souza proposes an account of HCI that draws on concepts from semiotics and computer science to investigate the relationship between user and designer. Semiotics is the study of signs, and the essence of semiotic engineering is the communication between...
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)
Drawing on a wealth of new evidence from all sides, Triumph Forsaken overturns most of the historical orthodoxy on the Vietnam War. Through the analysis of international perceptions and power, it shows that South Vietnam was a vital interest of the United States. The book provides many new insights into the overthrow of Ngo Dinh Diem in 1963 and...
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

American Breakdown: The Trump Years and How They Befell Us
American Breakdown: The Trump Years and How They Befell Us
How Trump got to the Oval Office—and how both parties and the mainstream media are keeping him there

Donald Trump’s residency in the White House is not an accident of American history, and it can’t be blamed on a single cause. In American Breakdown, David Bromwich provides an essential analysis of...

Network Security Bible
Network Security Bible
If you need a solid foundation in network security, this is it

Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how
...
Afghanistan: A History from 1260 to the Present
Afghanistan: A History from 1260 to the Present
Located at the intersection of Asia and the Middle East, Afghanistan has been strategically important for thousands of years. Its ancient routes and strategic position between India, Inner Asia, China, Persia, and beyond has meant the region has been subject to frequent invasions, both peaceful and military. As a result, modern...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the...
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy