 |
|
 The Zombie Survival Guide: Complete Protection from the Living DeadThe Zombie Survival Guide is your key to survival against the hordes of undead who may be stalking you right now. Fully illustrated and exhaustively comprehensive, this book covers everything you need to know, including how to understand zombie physiology and behavior, the most effective defense tactics and weaponry, ways to... |  |  High-Level Data FusionMaster cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and... |  |  |
|
|
 Mac Security Bible
Your essential, no-holds-barred guide to Mac security threats and solutions
Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into... |  |  Strategic Information Security
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies.... |  |  Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)
With the fall of France in 1940, Germany suddenly had the opportunity to strike at poorly guarded Allied convoys. The Luftwaffe pressed into service the Fw-200 Condor, a plane that had originally been designed as a civilian airliner and the first plane to fly non-stop from Berlin to New York in 1938. After various modifications, the Fw-200... |
|
 Beginning ASP.NET Security (Wrox Programmer to Programmer)
Programmers: protect and defend your Web apps against attack!
You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and... |  |  Energy and Climate: How to achieve a successful energy transition
Despite global concerns over dwindling resources, climate change and carbon dioxide emissions, fossil fuels still account for more than 80% of the world’s energy demands. As resources diminish and demand increases from rapidly developing nations such as China and India, the threat to both our environment and the security of our energy... |  |  Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... |
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |