Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Mind + Body
Mind + Body

Chris Baker considered himself a normal teenager until shortly before his eighteenth birthday when his father died mysteriously, leaving behind an unexpected fortune. Everything changed after that. Now in the crosshairs of the FBI, the Marine Corps, Interpol, and a handful of trained killers, Chris finds himself in a world of guns, assassins,...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
The world’s most celebrated hacker delivers the lowdown on today’s most serious security weakness–human nature

"Finally someone is on to the real cause of data security breaches–stupid humans … Mitnick … reveals clever tricks of the ‘social engineering’ trade and shows how to fend them...

Bluff City: The Secret Life of Photographer Ernest Withers
Bluff City: The Secret Life of Photographer Ernest Withers

The little-known story of an iconic photographer, whose work captured?and influenced?a critical moment in American history.

Who was Ernest Withers? Most Americans may not know the name, but they do know his photographs. Withers took some of the most legendary images of the 1950s and ’60s: Martin...

Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

The Wolf of Wall Street
The Wolf of Wall Street

Now a major motion picture directed by Martin Scorsese and starring Leonardo DiCaprio

NEW YORK TIMES BESTSELLER
 
By day he made thousands of dollars a minute. By night he spent it as fast as he could, on drugs, sex, and international globe-trotting. From the binge that sank a
...

Vatican assassins: "wounded in the house of my friends"
Vatican assassins: "wounded in the house of my friends"
Eric Jon Phelps gives the past and present diabolical history of the Society of Jesus. Its Second Thirty Years' War (1914-1945), including the Jewish, Lutheran, Orthodox and Buddhist Holocausts, was vengeance for the Order's expulsion from Europe and Asia during the Nineteenth Century.

Its Cold War was the coninuation of the killing of
...
Securing LINUX Step by Step
Securing LINUX Step by Step
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,...
Digital Photographic Capture
Digital Photographic Capture
The major function of photography is to capture a picture from what is in front of you. Whether a picture of the family pet or advertising spread, the acquisition of the scene is the first step in the digital image process. Digital Photographic Capture takes that first step and it breaks it down in detail so you can understand and better manipulate...
Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Hardware Hacking: Have Fun While Voiding Your Warranty
Hardware Hacking: Have Fun While Voiding Your Warranty

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an...

Fisma Certification & Accreditation Handbook
Fisma Certification & Accreditation Handbook
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.

This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three
...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy