Home | Amazing | Today | Tags | Publishers | Years | Search 
Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
The international activities of regions have attracted considerable political and scholarly attention in recent years. This has perhaps been most notable in Europe, where the protagonism of regions within the EU and the alliances among regions have generated a substantial literature, but the phenomenon has also marked federal...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems
Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems

?This book provides the first comprehensive view of safe and secure CPS and IoT systems.  The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different...

The Journey to the Mayflower: God's Outlaws and the Invention of Freedom
The Journey to the Mayflower: God's Outlaws and the Invention of Freedom
An authoritative and immersive history of the far-reaching events in England that led to the sailing of the Mayflower.

2020 brings readers the 400th anniversary of the sailing of the Mayflower—the ship that took the Pilgrim Fathers to the New World. It is a foundational event in American history,
...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

E-waste Recycling and Management: Present Scenarios and Environmental Issues (Environmental Chemistry for a Sustainable World)
E-waste Recycling and Management: Present Scenarios and Environmental Issues (Environmental Chemistry for a Sustainable World)

This book gives up-to-date information and broad views on e-waste recycling and management using the latest techniques for industrialist and academicians. It describes the problems of e-waste generated by all global living communities and its impact on our ecosystems and discusses recycling techniques in detail to reduce its effect...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy