Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Warfare and Cyber Terrorism (Premier Reference)
Cyber Warfare and Cyber Terrorism (Premier Reference)
The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic...
Political Self-Sacrifice: Agency, Body and Emotion in International Relations (Cambridge Studies in International Relations)
Political Self-Sacrifice: Agency, Body and Emotion in International Relations (Cambridge Studies in International Relations)

Over the last decade the increasing phenomenon of suicide terrorism has raised questions about how it might be rational for individuals to engage in such acts. This book examines a range of different forms of political self-sacrifice, including hunger strikes, self-burning and non-violent martyrdom, all of which have taken place in resistance...

Data Warehousing and Knowledge Discovery: 10th International Conference, DaWak 2008 Turin, Italy, September 1-5, 2008, Proceedings
Data Warehousing and Knowledge Discovery: 10th International Conference, DaWak 2008 Turin, Italy, September 1-5, 2008, Proceedings
Data Warehousing and Knowledge Discovery have been widely accepted as key technologies for enterprises and organizations as a means of improving their abilities in data analysis, decision support, and the automatic extraction of knowledge from data. With the exponentially growing amount of information to be included in the decision making process,...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
  
   
   
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy