Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
Portrait of a Killer: Jack the Ripper -- Case Closed
Portrait of a Killer: Jack the Ripper -- Case Closed

The number-one New York Times-bestselling novelist Patricia Cornwell is known the world over for her brilliant storytelling, the courage of her characters, and the state-of-the-art forensic methods they employ.

In this headline-making new work of nonfiction, Cornwell turns her trademark skills for meticulous research
...

Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Contrast Data Mining: Concepts, Algorithms, and Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

A Fruitful Field for Researching Data Mining Methodology and for Solving Real-Life Problems
Contrast Data Mining: Concepts, Algorithms, and Applications collects recent results from this specialized area of data mining that have previously been scattered in the literature, making them more accessible to
...

The Renegade Hunter: A Rogue Hunter Novel
The Renegade Hunter: A Rogue Hunter Novel

The Argeneau family has a secret . . . one of their own is a rogue vampire!

Nicholas Argeneau was once a successful hunter who went after rogue vampires who broke the immortal law. Except no one has mentioned his name in the last fifty years, not since he turned into a rogue himself. But once a hunter, always a hunter. When...

Introduction to Residential Layout
Introduction to Residential Layout
Accessible guide to theory and practice of residential design.

Introduction to Residential Layout is ideal for students and practitioners of urban design, planning, engineering, architecture and landscape seeking a comprehensive guide to the theory and practice of designing and laying out residential areas.

Mike
...
Spatial Data Analysis: Theory and Practice
Spatial Data Analysis: Theory and Practice
Are there geographic clusters of disease cases, or hotspots of crime? Can the geography of air quality be matched to where people hospitalized for respiratory complaints actually live? Spatial data is data about the world where the attribute of interest and its location on the earth's surface are recorded. This comprehensive overview of the subject...
Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Geographic Profiling
Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic studies of crime were cartographic exercises made possible by recordkeeping systems created to track criminal convictions in France and England during the early part of the 19th century. Compared with maps of demographic, economic, and social...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities

Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled Machine Vision) clearly and systematically presents the basic methodology of computer and machine vision, covering the essential elements of the theory while emphasizing algorithmic and practical design constraints. This fully revised fourth edition has...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy