Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Renegade Hunter: A Rogue Hunter Novel
The Renegade Hunter: A Rogue Hunter Novel

The Argeneau family has a secret . . . one of their own is a rogue vampire!

Nicholas Argeneau was once a successful hunter who went after rogue vampires who broke the immortal law. Except no one has mentioned his name in the last fifty years, not since he turned into a rogue himself. But once a hunter, always a hunter. When...

Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Localizing the Moral Sense: Neuroscience and the Search for the Cerebral Seat of Morality, 1800-1930
Localizing the Moral Sense: Neuroscience and the Search for the Cerebral Seat of Morality, 1800-1930

Due to the current revolution in brain research the search for the “moral brain” became a serious endeavour. Nowadays, neural circuits that are indispensable for moral and social behaviour are discovered and the brains of psychopaths and criminals - the classical anti-heroes of morality - are scanned with curiosity, even...

No Middle Name: The Complete Collected Jack Reacher Short Stories
No Middle Name: The Complete Collected Jack Reacher Short Stories

NEW YORK TIMES BESTSELLER • Get ready for the ultimate Jack Reacher experience: a thrilling new novella and eleven previously published stories, together for the first time in one pulse-pounding collection from Lee Child.

No Middle Name begins with “Too Much Time,” a brand-new work of
...

Computer Viruses and Malware (Advances in Information Security)
Computer Viruses and Malware (Advances in Information Security)

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the...

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Introduction to Residential Layout
Introduction to Residential Layout
Accessible guide to theory and practice of residential design.

Introduction to Residential Layout is ideal for students and practitioners of urban design, planning, engineering, architecture and landscape seeking a comprehensive guide to the theory and practice of designing and laying out residential areas.

Mike
...
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence

In April 2005, I received a telephone call from Humana Press Senior Editor, Harvey Kane, inquiring whether there might be a need for a book to be published concerning the different aspects of computer forensics. During a subsequent meeting to discuss the current state of available texts covering this topic, I noted to Mr. Kane that there were...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy