Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Recruited by British Intelligence to infiltrate the IRA and Sinn Féin during the height of the Northern Ireland Troubles, they were ‘agents of influence’. With codenames like INFLICTION, STAKEKNIFE, 3007 and CAROL, these spies played a pivotal role in the fight against Irish republicanism. Now, for the first time,...
Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Learn Raspberry Pi with Linux (Technology in Action)
Learn Raspberry Pi with Linux (Technology in Action)

Learn Raspberry Pi with Linux will tell you everything you need to know about the Raspberry Pi's GUI and command line so you can get started doing amazing things. You'll learn how to set up your new Raspberry Pi with a monitor, keyboard and mouse, and you'll discover that what may look unfamiliar in Linux is really very...

101 Spy Gadgets for the Evil Genius
101 Spy Gadgets for the Evil Genius
101 SPY DEVICES FOR SERIOUS SNOOPING

This book offers an amazingly awesome and complete collection of professional spy tools that you can build yourself. You can build any project in this thrilling arsenal of spy devices for $30 or less! Not only that, even total beginners to electronics can construct these mind-boggling...

Raspberry Pi By Example
Raspberry Pi By Example

Start building amazing projects with the Raspberry Pi right out of the box

About This Book

  • Explore the vast range of opportunities provided by Raspberry Pi and other hardware components such as a webcam, the Pi camera, and sensors
  • Get hands-on experience with coding, networking, and...
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Encyclopedia of Espionage, Intelligence and Security
Encyclopedia of Espionage, Intelligence and Security
In composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.

EEIS is not intended as a classical “spy book,” filled with
...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Confessions of an Economic Hit Man
Confessions of an Economic Hit Man

Confessions of an Economic Hit Man reveals a game that, according to John Perkins, is "as old as Empire" but has taken on new and terrifying dimensions in an era of globalization. And Perkins should know. For many years he worked for an international consulting firm where his main job was to convince LDCs (less developed...

Practical Lock Picking: A Physical Penetration Tester's Training Guide
Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the wonderful time in which you currently find yourself. To be alive and learning right now—when there are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written with passion visible on...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy