Home | Amazing | Today | Tags | Publishers | Years | Search 
IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Populations, Public Health, and the Law
Populations, Public Health, and the Law
Law plays a crucial role in protecting the health of populations. Whether the public health threat is bioterrorism, pandemic influenza, obesity, or lung cancer, law is an essential tool for addressing the problem. Yet for many decades, courts and lawyers have frequently overlooked law's critical importance to public health. "Populations,...
Mac Security Bible
Mac Security Bible

Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into...

Collaborative Computer Security and Trust Management (Premier Reference Source)
Collaborative Computer Security and Trust Management (Premier Reference Source)

Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the...

New Moon (The Twilight Saga, Book 2)
New Moon (The Twilight Saga, Book 2)

"Shoot," I muttered when the paper sliced my finger; I pulled it out to examine the damage. A single drop of blood oozed from the tiny cut. It all happened very quickly then. Edward threw himself at me, flinging me back across the table... I tumbled down to the floor by the piano, with my arms thrown out instinctively to catch...

Before Auschwitz: Irène Némirovsky and the Cultural Landscape of Inter-war France (Routledge Studies in Twentieth-Century Literature)
Before Auschwitz: Irène Némirovsky and the Cultural Landscape of Inter-war France (Routledge Studies in Twentieth-Century Literature)

This book analyses Irene Némirovsky’s literary production in its relationship to the literary and cultural context of the inter-war period in France. It examines topics of central importance to our understanding of the literary field in France in the period, such as: the close relationship between politics and literature; the...

Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
The Zombie Survival Guide: Complete Protection from the Living Dead
The Zombie Survival Guide: Complete Protection from the Living Dead
The Zombie Survival Guide is your key to survival against the hordes of undead who may be stalking you right now. Fully illustrated and exhaustively comprehensive, this book covers everything you need to know, including how to understand zombie physiology and behavior, the most effective defense tactics and weaponry, ways to...
Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy