Home | Amazing | Today | Tags | Publishers | Years | Search 
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
As a reporter, columnist, and author who has written extensively about organized crime for more than three decades, my primary beat has been what is referred to by the Federal Bureau of Investigation (FBI) as “traditional organized crime.” In official court documents, the FBI identifies the organization as La Cosa Nostra (LCN). Most...
What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People
What Every BODY is Saying: An Ex-FBI Agent's Guide to Speed-Reading People

Read this book and send your nonverbal intelligence soaring. Joe Navarro, a former FBI counterintelligence officer and a recognized expert on nonverbal behavior, explains how to "speed-read" people: decode sentiments and behaviors, avoid hidden pitfalls, and look for deceptive behaviors. You'll also learn how your body language...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Bluff City: The Secret Life of Photographer Ernest Withers
Bluff City: The Secret Life of Photographer Ernest Withers

The little-known story of an iconic photographer, whose work captured?and influenced?a critical moment in American history.

Who was Ernest Withers? Most Americans may not know the name, but they do know his photographs. Withers took some of the most legendary images of the 1950s and ’60s: Martin...

THE WORLD ENCYCLOPEDIA OF SERIAL KILLERS: Volume Four T-Z
THE WORLD ENCYCLOPEDIA OF SERIAL KILLERS: Volume Four T-Z
The World Encyclopedia of Serial Killers is the most comprehensive set of its kind in the history of true crime publishing. Written and compiled by Susan Hall, the four-volume set has more than 1600 entries of male and female serial killers from around the world.

Defined by the FBI as a person who murders 3 or...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
The world’s most celebrated hacker delivers the lowdown on today’s most serious security weakness–human nature

"Finally someone is on to the real cause of data security breaches–stupid humans … Mitnick … reveals clever tricks of the ‘social engineering’ trade and shows how to fend them...

Skype Me!: From Single User to Small Enterprise and Beyond
Skype Me!: From Single User to Small Enterprise and Beyond
You are going to love Skype Me! From Single User to Small Enterprise and Beyond. Here’s why: Michael Gough knows his stuff. Michael has also completed a remarkably difficult project around a remarkably cool product, Skype.

Michael is a busy guy. I have no idea where he found time to write a
...
Securing LINUX Step by Step
Securing LINUX Step by Step
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,...
The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First
The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First
Takes the reader inside the often bizarre world of the Earth First! Movement and the back to nature counterculture of California's North Coast.

Kate Coleman traces Judi Bari's rise from college activist to would-be Mother Jones of the Redwoods. Drawing on extensive interviews with Bari's friends and comrades as well as critics, Coleman
...
Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy