Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Against All Odds: A Novel
Against All Odds: A Novel

NEW YORK TIMES BESTSELLER • The wise, moving new novel from Danielle Steel, whose many bestselling tales have made her one of America’s favorite authorsTaking chances is part of life, but when you bet your future against the odds, it’s a high-risk game. Kate Madison’s stylish resale shop has been a...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Robert B. Parker's Kickback (Spenser)
Robert B. Parker's Kickback (Spenser)

PI Spenser, knight-errant of the Back Bay, returns in this stellar New York Times–bestselling addition to the iconic series from author Ace Atkins.
 
What started out as a joke landed seventeen-year-old Dillon Yates in a lockdown juvenile facility in Boston Harbor. When he set up a prank Twitter
...

Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective
Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective

Comprehensive and user friendly, this book synthesizes the growing literature on symptom feigning in cognitive testing and translates it into evidence-based recommendations for clinical and forensic practice. A wide range of cognitive effort assessment techniques and strategies are critically...

Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)
Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)

In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins

As little as two decades ago, deliberately injecting botulinum toxin into patients would have seemed foolhardy at best and criminal at worst. The increased clinical use of botulinum toxins has expanded the body of knowledge available on the structure and function of these proteins. This knowledge can be applied to topics as varied as...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)
The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)

The Handbook of Homicide presents a series of original essays by renowned authors from around the world, reflecting the latest scholarship on the nature, causes, and patterns of homicide, as well as policies and practices for its investigation and prevention.

  • Includes comprehensive coverage of the complex phenomenon...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy