Home | Amazing | Today | Tags | Publishers | Years | Search 
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The thrilling memoir of the world's most wanted computer hacker

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed
...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Facing the Mountain: A True Story of Japanese American Heroes in World War II
Facing the Mountain: A True Story of Japanese American Heroes in World War II
NEW YORK TIMES BESTSELLER
 
“Masterly. An epic story of four Japanese-American families and their sons who volunteered for military service and displayed uncommon heroism… Propulsive and gripping, in part because of Mr. Brown’s ability to make us care deeply
...
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Snatched: The FBI's Top Ten Art Crimes and more (Synova's Case Files)
Snatched: The FBI's Top Ten Art Crimes and more (Synova's Case Files)
Sit back and relax as Synova regales you with tales of master art thieves, bumbling criminals, and multi-million-dollar art heists from around the world. There will be stories of mafia-commissioned heists, of Daredevil art thieves, and of the brave men and women of the FBI Art team who are trying to stop this multi-billion-dollar industry of art...
The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
This book is the first of its kind to bring transparency to the FBI’s attempts to destroy the incipient Chicano Movement of the 1960s. While the activities of the deep state are current research topics, this has not always been the case. The role of the U.S. government in suppressing marginalized racial and ethnic minorities...
Fraud Exposed: What You Don't Know Could Cost Your Company Millions
Fraud Exposed: What You Don't Know Could Cost Your Company Millions
The $600 billion gorilla in the room

"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing...

Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy