Home | Amazing | Today | Tags | Publishers | Years | Search 
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Boxing and the Mob: The Notorious History of the Sweet Science
Boxing and the Mob: The Notorious History of the Sweet Science
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for...
The Mueller Report: The Final Report of the Special Counsel into Donald Trump, Russia, and Collusion
The Mueller Report: The Final Report of the Special Counsel into Donald Trump, Russia, and Collusion
NOW A NEW YORK TIMES, WASHINGTON POSTWALL STREET JOURNAL, USA TODAY, AND PUBLISHERS WEEKLY BESTSELLER.

There has never been a more important political investigation than Robert S. Mueller III's into President Donald Trump's possible collusion with Russia. His
...
Suicide by Democracy: an Obituary for America and the World
Suicide by Democracy: an Obituary for America and the World
merica and the world are in the process of collapse from excessive population growth, most of it for the last century, and now all of it, due to 3rd world people. Consumption of resources and the addition of 4 billion more ca. 2100 will collapse industrial civilization and bring about starvation, disease, violence and war on a staggering scale....
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
This book examines the role of deceptive tactics in the criminal victimization process, showing how various forms of manipulative aggression can help disguise dangerous advances. The author approaches crime victimization as the final stage in a purposeful, predictable, dynamic, and progressively dangerous process involving...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Howzzat?
Howzzat?
Sherlock Holmes with his fancy hat, magnifying glass and pipe always fascinated me. I was glued to every clue Perry Mason worked on. I would read with anticipation as Ganesh (Vasanth) reconstructed a crime with a seemingly simple object. The way these celebrated detectives worked was really captivating— piecing clues...
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
"A wise and thorough investigation." - Lawrence Wright, author of The Looming Tower and The Terror Years

Starting in late 2012, Westerners working in Syria -- journalists and aid workers -- began disappearing without a trace. A year later the world learned they had been taken hostage by the
...
Cities Ranked and Rated: More than 400 Metropolitan Areas Evaluated in the U.S. and Canada
Cities Ranked and Rated: More than 400 Metropolitan Areas Evaluated in the U.S. and Canada

Cities Ranked & Rated: Your Guide to the Best Places to Live in the U.S. & Canada provides timely facts and unbiased information on over 400 U.S. and 30 Canadian cities in an easy-to-access format. Whether you're mulling over the idea of relocating, trying to decide where to start out, or just curious about how your...

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy