Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an...

Scientology
Scientology
Scientology is arguably the most persistently controversial of all contemporary New Religious Movements. The Church of Scientology has been involved in battles over tax issues, a ten-year conflict with the Food and Drug Administration, extended turmoil with a number of European governments, and has even been subjected to FBI raids in Washington,...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Mike Meyers' A+ Guide: PC Technician (Exams 220-602, 220-603 & 220-604)
Mike Meyers' A+ Guide: PC Technician (Exams 220-602, 220-603 & 220-604)
Essential Skills for a Successful IT Career

Mike Meyers, the leading authority on CompTIA A+ training and certification, has helped hundreds of thousands of people master the skills covered on the CompTIA A+ exams--and now he can help you, too. Completely updated for the new CompTIA A+ standards, Mike Meyers' CompTIA...

You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth
You Can't Lie to Me: The Revolutionary Program to Supercharge Your Inner Lie Detector and Get to the Truth

Janine Driver was trained as a lie detection expert for the ATF, FBI, and the CIA and is a New York Times bestselling author (You Say More Than You Think). Now she makes a powerful and incontrovertible declaration: You Can’t Lie to Me.  Driver—who is known in professional circles as “the...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal
The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal

We live in digital time. Our pace is rushed, rapid-fire, and relentless. Facing crushing workloads, we try to cram as much as possible into every day. We're wired up, but we're melting down. Time management is no longer a viable solution. As bestselling authors Jim Loehr and Tony Schwartz demonstrate in this groundbreaking book,...

Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy