Home | Amazing | Today | Tags | Publishers | Years | Search 
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

“Part John le Carré and more parts Michael Crichton . . . spellbinding.” –The New Yorker

From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a
...

Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day
Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day

A ground-breaking account of the first 24 hours of the D-Day invasion told by a symphony of incredible accounts of unknown and unheralded members of the Allied – and Axis – forces.

An epic battle that involved 156,000 men, 7,000 ships and 20,000 armoured vehicles, D-Day was, above all, a tale of
...

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Raspberry Pi for Secret Agents
Raspberry Pi for Secret Agents

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!

Overview

  • Detect an intruder on camera and set off an alarm
  • Listen in or record conversations from a distance
  • Find out what the other computers on your network are up to
  • ...
The Everyday Internet All-in-One Desk Reference for Dummies
The Everyday Internet All-in-One Desk Reference for Dummies
8 books in 1 -- simplify your life with Internet tools
Your one-stop guide to using online resources, keeping in touch, and having fun!
The Internet is a worldwide workplace, a giant communications network, a vast playground, and there's a minibook here covering each aspect of it. Find out about e-mail, researching on the Web,
...
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
Encyclopedia of Espionage, Intelligence and Security
Encyclopedia of Espionage, Intelligence and Security
In composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.

EEIS is not intended as a classical “spy book,” filled with
...
Windows 95 System Programming Secrets
Windows 95 System Programming Secrets
This is no mere "How do I write a Windows 95 app?" manual. Windows 95 System Programming SECRETS reveals the hard-core technical information you need to know in order to tap the true power of 32-bit programming for Windows 95. Written for the programmer who's done at least some Windows 3.x programming,...
The Official XMLSPY Handbook
The Official XMLSPY Handbook
"The XMLSPY Handbook is your secret decoder ring to the entire world of XML and XMLSPY® 5."
–From the foreword by Alexander Falk,
President & CEO, Altova, Inc.

Here’s the only guide sanctioned by the XMLSPY company…

This is it – the only XMLSPY reference book...

Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy