Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal
The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal

We live in digital time. Our pace is rushed, rapid-fire, and relentless. Facing crushing workloads, we try to cram as much as possible into every day. We're wired up, but we're melting down. Time management is no longer a viable solution. As bestselling authors Jim Loehr and Tony Schwartz demonstrate in this groundbreaking book,...

Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design

Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer...

Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
As a reporter, columnist, and author who has written extensively about organized crime for more than three decades, my primary beat has been what is referred to by the Federal Bureau of Investigation (FBI) as “traditional organized crime.” In official court documents, the FBI identifies the organization as La Cosa Nostra (LCN). Most...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
The world’s most celebrated hacker delivers the lowdown on today’s most serious security weakness–human nature

"Finally someone is on to the real cause of data security breaches–stupid humans … Mitnick … reveals clever tricks of the ‘social engineering’ trade and shows how to fend them...

Scientology
Scientology
Scientology is arguably the most persistently controversial of all contemporary New Religious Movements. The Church of Scientology has been involved in battles over tax issues, a ten-year conflict with the Food and Drug Administration, extended turmoil with a number of European governments, and has even been subjected to FBI raids in Washington,...
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
Numb3rs looks like a winn3r.”
USA Today

The companion to the hit CBS crime series Numb3rs presents the fascinating way mathematics is used to fight real-life crime

Using the popular CBS prime-time TV crime series Numb3rs as a
...
The Art of Woo: Using Strategic Persuasion to Sell Your Ideas
The Art of Woo: Using Strategic Persuasion to Sell Your Ideas

You may need The Art of War to defeat your enemies, but if you prefer to win them over, read The Art of Woo

G. Richard Shell and Mario Moussa know what it takes to drive new ideas through complex organizations. They have advised thousands of executives from companies such as Google, Microsoft, and General
...

Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Our civilization runs on software. Yet the art of creating it continues to be a dark mystery, even to the experts, and the greater our ambitions, the more spectacularly we seem to fail.

Big software projects regularly crash and burn--just ask the FBI and the IRS, the Pentagon and the FAA, or any decent-size corporation. The...

Mathletics: How Gamblers, Managers, and Sports Enthusiasts Use Mathematics in Baseball, Basketball, and Football
Mathletics: How Gamblers, Managers, and Sports Enthusiasts Use Mathematics in Baseball, Basketball, and Football
If you have picked up this book you surely love sports and you probably like math. You may have read Michael Lewis’s great book Moneyball, which describes how the Oakland A’s used mathematical analysis to help them compete successfully with the New York Yankees even though the average annual payroll for the A’s is less than 40...
Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy