Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
Ransomware: Defending Against Digital Extortion
Ransomware: Defending Against Digital Extortion

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Asterisk Hacking
Asterisk Hacking
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all...
Knowledge, Possibility, and Consciousness (Jean Nicod Lectures)
Knowledge, Possibility, and Consciousness (Jean Nicod Lectures)
Physicalism is the idea that if everything that goes on in the universe is physical, our consciousness and feelings must also be physical. Ever since Descartes formulated the mind-body problem, a long line of philosophers has found the physicalist view to be preposterous. According to John Perry, the history of the mind-body problem is, in part,...
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Permanent Revolution: The Reformation and the Illiberal Roots of Liberalism
Permanent Revolution: The Reformation and the Illiberal Roots of Liberalism

How did the Reformation, which initially promoted decidedly illiberal positions, end up laying the groundwork for Western liberalism?

The English Reformation began as an evangelical movement driven by an unyielding belief in predestination, intolerance, stringent literalism, political quietism, and
...

Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

Effectiveness of Air Force Science and Technology Program Changes
Effectiveness of Air Force Science and Technology Program Changes

Under mandate of Section 253, Study and Report on Effectiveness of Air Force Science and Technology Program Changes, of the Fiscal Year 2002 National Defense Authorization Act (Public Law 107-107; U.S. Congress, 2001), the U.S. Air Force contracted with the National Research Council (NRC) to conduct the present study. In response,...

Future Cities: Designing Better, Smarter, More Sustainable and Secure Cities
Future Cities: Designing Better, Smarter, More Sustainable and Secure Cities

In Future Cities, three authors - futurists, urban experts and systems architects - consider how the demands of the 21st Century will reshape the places where half of the world's population lives. From the history of urban development to the challenges of climate change and terrorism, they show how technology advances have shaped cities...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy