Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
"The book examines each program, offers various solutions and case studies for each disposal problem, and provides additional sources of information for each program for further reading or consultation."- The Hazardous Waste Consultant.

This book discusses the current and potential treatment technologies involved in
...
Protective Security: Creating Military-Grade Defenses for Your Digital Business
Protective Security: Creating Military-Grade Defenses for Your Digital Business

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...

Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Maximum Wireless Security
Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...

Securing Citrix XenApp Server in the Enterprise
Securing Citrix XenApp Server in the Enterprise
Secure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features
...
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...

Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
America's Other War: Terrorizing Colombia
America's Other War: Terrorizing Colombia
This controversial book maintains that in Colombia the US has long supported a pervasive campaign of state violence directed against both armed insurgents and a wide range of unarmed progressive social forces. While the context may change from one decade to the next, the basic policies remain the same: maintain the pro-US Colombian...
The Palgrave Handbook of Philosophy and Public Policy
The Palgrave Handbook of Philosophy and Public Policy
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues...
Electrical Engineering: Know It All
Electrical Engineering: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
From the reviews:

 

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...

Energy Supply and Renewable Resources
Energy Supply and Renewable Resources
One has only to read a newspaper or magazine to realize the importance of energy at this early juncture of the 21st century. It will surely become more critical as world demand for oil continues to increase and its supply peaks and begins to fall.

Industrialized nations have become addicted to an ever-increasing
...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy