Home | Amazing | Today | Tags | Publishers | Years | Search 
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Encyclopedia of the Solar System, Second Edition
Encyclopedia of the Solar System, Second Edition
Long before Galileo published his discoveries about Jupiter, lunar craters, and the Milky Way in the Starry Messenger in 1610, people were fascinated with the planets and stars around them. That interest continues today, and scientists are making new discoveries at an astounding rate. Ancient lake beds on Mars, robotic spacecraft missions, and...
The Culture of Vengeance and the Fate of American Justice
The Culture of Vengeance and the Fate of American Justice
America is driven by vengeance in Terry Aladjem's provocative account - a reactive, public anger that is a threat to democratic justice itself. From the return of the death penalty to the wars on terror and in Iraq, Americans demand retribution and moral certainty; they assert the "rights of victims" and make pronouncements against...
Nanoscale Devices - Fundamentals and Applications (NATO Science Series II: Mathematics, Physics and Chemistry)
Nanoscale Devices - Fundamentals and Applications (NATO Science Series II: Mathematics, Physics and Chemistry)
Over the last decade the interest in nanoscale materials and their applications in novel electronic devices have been increasing tremendously. This is caused by the unique properties of nanoscale materials and the outstanding performance of nanoscale devices. The fascinating and often unrivalled properties of nanoscale materials and devices opened...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Aspects of Explosives Detection
Aspects of Explosives Detection
Detection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the...
Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics and Modeling of Tera- and Nano-Devices is a compilation of papers by well-respected researchers working in the field of physics and modeling of novel electronic and optoelectronic devices. The topics covered include devices based on carbon nanotubes, generation and detection of terahertz radiation in semiconductor structures including...
Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face.

Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to...

Sukhoi S-37 and Mikoyan MFI: Russian Fifth-Generation Fighter Demonstrators (Red Star, Vol. 1)
Sukhoi S-37 and Mikoyan MFI: Russian Fifth-Generation Fighter Demonstrators (Red Star, Vol. 1)
Conceived in the early 1980s to ease the threat posed by the American ATF program, these fighters were developed as the Soviet Union's fifth-generation fighters. This book gives a detailed account of how Russia's two leading fighter aircraft designers competed for the order and how a third contender never made it to the hardware stage. It deals...
Online Algorithms: The State of the Art (Lecture Notes in Computer Science)
Online Algorithms: The State of the Art (Lecture Notes in Computer Science)
When Hannibal crossed the Alps into Italy, it was no longer as simple to respond to a Roman naval threat in Spain as it was before crossing the Alps. Had Hannibal known the entire future Roman strategy before crossing the Alps then (assuming appropriate computational ability) he could have computed an optimal strategy to deal with the Rome/Cartago...
Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
The hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a...
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy