Home | Amazing | Today | Tags | Publishers | Years | Search 
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Hands-On Cybersecurity for Architects: Plan and design robust security architectures
Hands-On Cybersecurity for Architects: Plan and design robust security architectures

Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization

Key Features

  • Architect complex security structures using standard practices and use cases
  • Integrate security with any...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
Hiding in Plain Sight: Deceptive Tactics and the Criminal Victimization Process
This book examines the role of deceptive tactics in the criminal victimization process, showing how various forms of manipulative aggression can help disguise dangerous advances. The author approaches crime victimization as the final stage in a purposeful, predictable, dynamic, and progressively dangerous process involving...
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Howzzat?
Howzzat?
Sherlock Holmes with his fancy hat, magnifying glass and pipe always fascinated me. I was glued to every clue Perry Mason worked on. I would read with anticipation as Ganesh (Vasanth) reconstructed a crime with a seemingly simple object. The way these celebrated detectives worked was really captivating— piecing clues...
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
"A wise and thorough investigation." - Lawrence Wright, author of The Looming Tower and The Terror Years

Starting in late 2012, Westerners working in Syria -- journalists and aid workers -- began disappearing without a trace. A year later the world learned they had been taken hostage by the
...
First Raise a Flag: How South Sudan Won the Longest War but Lost the Peace
First Raise a Flag: How South Sudan Won the Longest War but Lost the Peace
When South Sudan's war began, the Beatles were playing their first hits and reaching the moon was an astronaut's dream. Half a century later, with millions massacred in Africa's longest war, the continent's biggest country split in two. It was an extraordinary, unprecedented experiment. Many have fought, but South Sudan did the...
Suicide by Democracy: an Obituary for America and the World
Suicide by Democracy: an Obituary for America and the World
merica and the world are in the process of collapse from excessive population growth, most of it for the last century, and now all of it, due to 3rd world people. Consumption of resources and the addition of 4 billion more ca. 2100 will collapse industrial civilization and bring about starvation, disease, violence and war on a staggering scale....
The Mueller Report: The Final Report of the Special Counsel into Donald Trump, Russia, and Collusion
The Mueller Report: The Final Report of the Special Counsel into Donald Trump, Russia, and Collusion
NOW A NEW YORK TIMES, WASHINGTON POSTWALL STREET JOURNAL, USA TODAY, AND PUBLISHERS WEEKLY BESTSELLER.

There has never been a more important political investigation than Robert S. Mueller III's into President Donald Trump's possible collusion with Russia. His
...
Boxing and the Mob: The Notorious History of the Sweet Science
Boxing and the Mob: The Notorious History of the Sweet Science
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for...
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy