Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)
Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)

Definitive, Comprehensive SCEA Exam Prep–Straight from Sun’s Exam Developers!

 

This book delivers complete, focused review for Sun’s...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Evaluating Novel Threats to the Homeland: Unmanned Aerial Vehicles and Cruise Missiles
Deciding how to invest homeland security resources wisely in the United States can often appear to be an intractable problem because the large, open American society seems to be so vulnerable to so many threats in every corner of the country. This monograph is intended to help bound the problem in order to aid policy and resource decisions about...
American Criminal Courts: Legal Process and Social Context
American Criminal Courts: Legal Process and Social Context

American Criminal Courts: Legal Process and Social Context provides a complete picture of both the theory and day-to-day reality of criminal courts in the United States. The book begins by exploring how democratic processes affect criminal law, the documents that define law, the organizational structure of courts at the federal...

EW 102: A Second Course in Electronic Warfare
EW 102: A Second Course in Electronic Warfare
Serving as a continuation of the bestselling book EW 101: A First Course in Electronic Warfare, this new volume is a second installment of popular tutorials featured in the Journal of Electronic Defense. Without delving into complex mathematics, this book gives engineers, defense contractors, managers, and government procurers a basic working...
RF Components and Circuits
RF Components and Circuits
*A complete course in understanding and designing RF circuits
*Practical design knowhow from a world-class author

A comprehensive introduction to designing and understanding RF circuits

RF Components and Circuits covers the practicalities of designing and building circuits, including fault-finding and use of test
...
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
Over the past few years I’ve been exposed to many different IT environments as part of a wide range of SOA initiatives for clients in both private and public sectors. While doing some work on a project for a client in the defense industry, I had an opportunity to learn more about not just their technical landscape, but also the various...
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

Explosives and Chemical Weapons Identification (Forensic Science Techniques)
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.

What is a first responder? It is a phrase often mentioned in the press but rarely defined.
...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy