|
|
|
|
|
|
Conquest in Cyberspace: National Security and Information WarfareWith billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies... | | | | Windows Server 2008 R2 Unleashed
Windows Server 2008 R2 Unleashed is the most comprehensive and realistic guide to planning, design, prototyping, implementation, migration, administration, and support. Based on the authors’ unsurpassed experience working with Windows Server 2008 R2 since its earliest alpha releases, it offers indispensable... |
|
Arctic Security in an Age of Climate Change
This is the first book to examine Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway, and the United States, as well as Iceland, Sweden, and Finland, are grappling with an emerging Arctic... | | Chemical Risk Assessment: A Manual for REACH
This book is an essential guide and support to understanding of the science and policy, procedure and practice that underpins the REACH risk assessments required for the use and placing on the market of chemicals in the European Union. A clear understanding of information provision and how this affects the assessment of chemical safety... | | The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security... |
|
|
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 |