Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
Maoism: A Global History
Maoism: A Global History
*** WINNER OF THE 2019 CUNDILL HISTORY PRIZE
SHORTLISTED FOR THE BAILLIE GIFFORD PRIZE FOR NON-FICTION 2019
SHORTLISTED FOR THE NAYEF AL-RODHAN PRIZE FOR GLOBAL UNDERSTANDING
SHORTLISTED FOR DEUTSCHER PRIZE
LONGLISTED FOR THE 2020 ORWELL PRIZE FOR POLITICAL WRITING***
...
Extradition Laws in the International and Indian Regime: Focusing on Global Terrorism
Extradition Laws in the International and Indian Regime: Focusing on Global Terrorism

The book examines the international treaty regimes and the Indian laws in depth. It also looks into the landmark cases, decided by both, the domestic courts in India and the international tribunals. The book would give an understanding between the concepts of extradition in relation to terrorism-related cases. It would provide an...

Jihadism, Foreign Fighters and Radicalization in the EU: Legal, Functional and Psychosocial Responses (Contemporary Terrorism Studies)
Jihadism, Foreign Fighters and Radicalization in the EU: Legal, Functional and Psychosocial Responses (Contemporary Terrorism Studies)

Jihadism, Foreign Fighters and Radicalization in the EU addresses the organizational and strategic changes in terrorism in Europe as a result of urban jihadism and the influx of foreign fighters of European nationality or residence.

Examining the different types of responses to the treatment of radicalization...

Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
This book provides guidance on measures that should be considered to protect human lives from terrorist activities involving nuclear, chemical, and biological weapons. It provides a historical summary of the development and use of these weapons, and continues with a detailed discussion of the types of radiation and warfare agents that are...
A Lighter Footprint: A Practical Guide to Minimising Your Impact on the Planet
A Lighter Footprint: A Practical Guide to Minimising Your Impact on the Planet
I believe that global warming is the biggest issue facing humanity today – it represents a far greater threat than terrorism, fundamentalism, or nuclear war. I am not alone in this belief. Scientists and many policymakers agree that the global population must reduce greenhouse gas emissions by at least 60 per cent...
Advances in Ambient Intelligence: Volume 164 Frontiers in Artificial Intelligence and Applications
Advances in Ambient Intelligence: Volume 164 Frontiers in Artificial Intelligence and Applications

Ambient Intelligence lies at the confluence of several trends: the continued decrease in cost and size of computing technology; the increasing availability of networking and communication infrastructure; the growing public familiarity/comfort with computing artifacts; and practical advances in artificial intelligence. These developments make...

Introduction to Security, Eighth Edition
Introduction to Security, Eighth Edition

Introduction to Security, 8th Edition, has been the leading introduction to private security for over thirty years, celebrated for its balanced and professional approach to this increasingly important area. Now the eighth edition expands the key topics and adds material on important issues in the 21st c environment.

...

Outspoken: Free Speech Stories
Outspoken: Free Speech Stories
"America's national obsession with asserting, and quelling, free-speech comes alive in this collection of profiles of First Amendment firebrands.Ê.Ê.Ê. The author goes beyond the usual polarized corners of political correctness.Ê.Ê.Ê.Êher nuanced treatment of all sides of the debate makes this a...
Criminology For Dummies
Criminology For Dummies

Your thorough guide to comprehending and combating crime

Are you fascinated by criminology, forensics, and detective work? This you-are-there guide takes you deep into the world of crime, giving you a better understanding of the dark recesses of the criminal mind and how law enforcement officials investigate crime. You'll gain real-world...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy