Home | Amazing | Today | Tags | Publishers | Years | Search 
Analysis of Air-Based Mechanization and Vertical Envelopment Concepts and Technologies
Analysis of Air-Based Mechanization and Vertical Envelopment Concepts and Technologies
The Army After Next (AAN) concept of rapidly deployable mechanized battleforces in a tactical environment requires the forces to be readilytransported by vertical, or near-vertical, lift aircraft. In the nonlinearAAN battlefield, this may require the forces to be deployed near the enemy1ssecond echelon. The authors examined the performance of the...
Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

Solar Energy Engineering: Processes and Systems
Solar Energy Engineering: Processes and Systems
With the threat of global warming, and the gradual depletion of petroleum supplies, solar electric power is rapidly becoming significant part of our energy mix. The range of solar cells spans different materials and different structures in the quest to extract maximum power from the device while keeping the cost to a minimum. Devices with...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Knowledge, Possibility, and Consciousness (Jean Nicod Lectures)
Knowledge, Possibility, and Consciousness (Jean Nicod Lectures)
Physicalism is the idea that if everything that goes on in the universe is physical, our consciousness and feelings must also be physical. Ever since Descartes formulated the mind-body problem, a long line of philosophers has found the physicalist view to be preposterous. According to John Perry, the history of the mind-body problem is, in part,...
SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and torture are twin evils that have dominated news headlines - particularly since the horrifying events of 9/11. In this thought-provoking volume, scholars from a diverse range of disciplines examine the complex motivational and situational factors contributing to terrorist acts and state-sponsored torture, and the potential linkage...
Populations, Public Health, and the Law
Populations, Public Health, and the Law
Law plays a crucial role in protecting the health of populations. Whether the public health threat is bioterrorism, pandemic influenza, obesity, or lung cancer, law is an essential tool for addressing the problem. Yet for many decades, courts and lawyers have frequently overlooked law's critical importance to public health. "Populations,...
Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

The Zombie Survival Guide: Complete Protection from the Living Dead
The Zombie Survival Guide: Complete Protection from the Living Dead
The Zombie Survival Guide is your key to survival against the hordes of undead who may be stalking you right now. Fully illustrated and exhaustively comprehensive, this book covers everything you need to know, including how to understand zombie physiology and behavior, the most effective defense tactics and weaponry, ways to...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy