|
|
|
|
|
Asterisk HackingAsterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all... | | Knowledge, Possibility, and Consciousness (Jean Nicod Lectures)Physicalism is the idea that if everything that goes on in the universe is physical, our consciousness and feelings must also be physical. Ever since Descartes formulated the mind-body problem, a long line of philosophers has found the physicalist view to be preposterous. According to John Perry, the history of the mind-body problem is, in part,... | | Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... |
|
Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... | | Cisco ASA Configuration (Networking Professional's Library)Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of... | | |
|
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online LivesUncover the Threats Lurking in the Darkness of Your Family's Computer
Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using... | | Effectiveness of Air Force Science and Technology Program Changes
Under mandate of Section 253, Study and Report on
Effectiveness of Air Force Science and Technology
Program Changes, of the Fiscal Year 2002 National
Defense Authorization Act (Public Law 107-107; U.S.
Congress, 2001), the U.S. Air Force contracted with
the National Research Council (NRC) to conduct the
present study. In response,... | | Future Cities: Designing Better, Smarter, More Sustainable and Secure Cities
In Future Cities, three authors - futurists, urban experts and systems architects - consider how the demands of the 21st Century will reshape the places where half of the world's population lives. From the history of urban development to the challenges of climate change and terrorism, they show how technology advances have shaped cities... |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |