Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Agents of Influence: Britain’s Secret Intelligence War Against the IRA
Recruited by British Intelligence to infiltrate the IRA and Sinn Féin during the height of the Northern Ireland Troubles, they were ‘agents of influence’. With codenames like INFLICTION, STAKEKNIFE, 3007 and CAROL, these spies played a pivotal role in the fight against Irish republicanism. Now, for the first time,...
Word Origins
Word Origins
The average English speaker knows around 50,000 words. That represents an astonishing diversity – nearly 25 times more words than there are individual stars visible to the naked eye in the night sky. And even 50,000 seems insignificant beside the half a million recorded in the Oxford English Dictionary. But looked at from an...
Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Encyclopedia of Pulp Fiction Writers (Literary Movements)
Encyclopedia of Pulp Fiction Writers (Literary Movements)

From the early days of dime novels to contemporary mass-market paperbacks, pulp fiction is a vital part of popular culture. This volume offers a survey of the scores of well-known and unsung heroes of popular literature. It seeks to cover the entire spectrum of pop literature's greatest entertainers and artists; the multimillion-copy...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

SOA and Web Services Interface Design: Principles, Techniques, and Standards (The MK/OMG Press)
SOA and Web Services Interface Design: Principles, Techniques, and Standards (The MK/OMG Press)
With the introduction of increasingly complex Web services over the last decade, there has been an explosion of interest in service-oriented architecture (SOA), a structural style whose goal is to achieve a coupling of interacting services - functionalities such as filling out an online application for an account, viewing an online bank statement,...
Learn Raspberry Pi with Linux (Technology in Action)
Learn Raspberry Pi with Linux (Technology in Action)

Learn Raspberry Pi with Linux will tell you everything you need to know about the Raspberry Pi's GUI and command line so you can get started doing amazing things. You'll learn how to set up your new Raspberry Pi with a monitor, keyboard and mouse, and you'll discover that what may look unfamiliar in Linux is really very...

Microsoft Windows Vista Unleashed (2nd Edition)
Microsoft Windows Vista Unleashed (2nd Edition)
Microsoft Windows Vista Unleashed, Second Edition, is a book for people, like you, who don’t consider themselves to be “average users.” It’s a book for anyone who finds that doing things the official way is slower, less efficient, and less powerful because Windows Vista was designed from the ground up to avoid...
Microsoft Windows Home Server 2011 Unleashed (3rd Edition)
Microsoft Windows Home Server 2011 Unleashed (3rd Edition)

Covers the newest version of WHS!

 

This is the most comprehensive, practical, and useful guide to the brand-new version of Windows Home Server 2011. Paul McFedries doesn’t just cover all facets of running Windows Home Server: He shows how to use it...

Test-Driven Development with Mockito
Test-Driven Development with Mockito

Learn how to apply Test-Driven Development and the Mockito framework in real life projects, using realistic, hands-on examples

Overview

  • Start writing clean, high quality code to apply Design Patterns and principles
  • Add new features to your project by applying Test-first development- JUnit...
Gilded Youth: Privilege, Rebellion and the British Public School
Gilded Youth: Privilege, Rebellion and the British Public School
The British public school is an iconic institution, a training ground for the ruling elite and a symbol of national identity and tradition. But beyond the elegant architecture and evergreen playing fields is a turbulent history of teenage rebellion, sexual dissidence, and political radicalism. James Brooke-Smith wades into the...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy