 |
|
 Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)
With the fall of France in 1940, Germany suddenly had the opportunity to strike at poorly guarded Allied convoys. The Luftwaffe pressed into service the Fw-200 Condor, a plane that had originally been designed as a civilian airliner and the first plane to fly non-stop from Berlin to New York in 1938. After various modifications, the Fw-200... |  |  Beginning ASP.NET Security (Wrox Programmer to Programmer)
Programmers: protect and defend your Web apps against attack!
You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and... |  |  Strategic Information Security
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies.... |
|
|
 Environmental Regulations and Global Warming
When the 2007 Nobel Peace Prize went to former Vice President Al Gore and an international scientific body that warned of serious consequences if Earth's temperatures continue to rise, the award underscored the international concern about the Earth's changing climate. Most scientists agree that global warming is a serious threat, and... |  |  America's Other War: Terrorizing Colombia
This controversial book maintains that in Colombia the US has long supported a pervasive campaign of state violence directed against both armed insurgents and a wide range of unarmed progressive social forces. While the context may change from one decade to the next, the basic policies remain the same: maintain the pro-US Colombian ... |  |  Energy (Greenwood Guides to Business and Economics)
Energy: We want it affordable, we want it available in ample quantities and from reliable sources, and we want it to be produced and used in ways that are safe and environmentally benign. In other words, we want plenty of energy too cheap to meter and with no impact on the environment. Ha! With a refreshing lack of bias, this book dissects... |
|
 Biodiversity under Threat (Issues in Environmental Science and Technology)
'This is a timely, thoughtful and authoritative account of the current state of play on the ecological battlefront'. Rouvray D., 2008. Biodiversity for chemists. Chemistry World, 5 (1), p.p.64-65.
There is much public concern about threats to global biodiversity. Industrial pollution, changes in agricultural practices... |  |  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |  |  |
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |