Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Critical Code: Software Producibility for Defense
Critical Code: Software Producibility for Defense

The Committee for Advancing Software-Intensive Systems Producibility was appointed by the National Research Council (NRC) and convened under the auspices of the NRC’s Computer Science and Telecommunications Board (CSTB) to assess the nature of the national investment in software research and, in particular, to consider ways to...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

Handbook of Chemical and Biological Warfare Agents
Handbook of Chemical and Biological Warfare Agents
With terrorist groups expanding their weapons of destruction beyond bombs and bullets, chemical and biological warfare agents aren't merely limited to the battlefield anymore. In some cases, they are now being used on a new front: major metropolitan cities. And in the Handbook of Chemical and Biological Warfare Agents, emergency response...
South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
South Korea’s 70-Year Endeavor for Foreign Policy, National Defense, and Unification
This book brings Korea's finest foreign policy minds together in contemplating the risks and rewards of finally ending the 70 year stalemate between North and South Korea through reunification. While North Korea is in conflict with the United States over denuclearization and regime security, the South Korean government is focusing on...
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF....

Business Plans Kit For Dummies (Business & Personal Finance)
Business Plans Kit For Dummies (Business & Personal Finance)

With checklists, forms, and unbeatable resources to help you succeed

The painless way to create a winning business plan!

If you're an entrepreneur with big ideas but no plan, this friendly guide is for you. Updated and revised to better meet your business needs, this business plan companion covers it all — from...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

The Technical and Social History of Software Engineering
The Technical and Social History of Software Engineering

“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, its long and fascinating history....

Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011
Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011

This volume contains papers presented at the 8th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2011), held in Changsha, China, July 28-30. This conference followed MDAI 2004 (Barcelona, Catalonia, Spain),MDAI 2005 (Tsukuba, Japan),MDAI 2006 (Tarragona,Catalonia, Spain), MDAI 2007 (Kitakyushu,...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy