Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and torture are twin evils that have dominated news headlines - particularly since the horrifying events of 9/11. In this thought-provoking volume, scholars from a diverse range of disciplines examine the complex motivational and situational factors contributing to terrorist acts and state-sponsored torture, and the potential linkage...
Diagnostic Atlas of Common Eyelid Diseases
Diagnostic Atlas of Common Eyelid Diseases
For any clinician dealing with ophthalmic diseases, individual lesions of the eyelid and conjunctiva can be extremely confusing. From a practical perspective such lesions are either benign or malignant, and can be cystic or solid, melanotic or amelanotic. Certainly the most important diagnostic question is whether the lesion...
Mutiny and Leadership
Mutiny and Leadership
Whenever leadership emerges within a group, there will be resistance to that leadership. Discontent may manifest in a number of ways, and action will always be determined by factors such as resource, numbers, time, space, and the legitimacy of the resistance. What, then, turns discontent into
mutiny?

Mutiny is often
...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
—John Baichtal (Wired Blog, August, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Recent Trends in Information Reuse and Integration
Recent Trends in Information Reuse and Integration
We are delighted to see this edited book as the result of our intensive work over the past year. We succeeded in attracting high quality submissions of which we could only include 19 papers in this edited book. The present text aims at helping the reader whether researcher or practitioner to grasp the basic concept of reusability...
Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy