Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
America's Other War: Terrorizing Colombia
America's Other War: Terrorizing Colombia
This controversial book maintains that in Colombia the US has long supported a pervasive campaign of state violence directed against both armed insurgents and a wide range of unarmed progressive social forces. While the context may change from one decade to the next, the basic policies remain the same: maintain the pro-US Colombian...
Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

End-to-End Network Security: Defense-in-Depth
End-to-End Network Security: Defense-in-Depth
The network security lifecycle requires specialized support and a commitment to best practice standards. In this book, you will learn best practices that draw upon disciplined processes, frameworks, expert advice, and proven technologies that will help you protect your infrastructure and organization. You will learn end-to-end security best...
Communicating Knowledge: Publishing in the 21st Century (Topics in Library and Information Studies)
Communicating Knowledge: Publishing in the 21st Century (Topics in Library and Information Studies)
At the beginning of the twenty-first century, systems of communication are undergoing profound change. Some analysts see this change as revolutionary, comparable with the invention of printing in the west in the fifteenth century, or even of written language itself in the ancient world. Others see it as merely evolutionary, a further application of...
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.

Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Expert Oracle Application Express Security (Expert's Voice in Oracle)
Expert Oracle Application Express Security (Expert's Voice in Oracle)

Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development.  From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle Application Express Security shows how to secure your APEX...

Managing Business Risk: A Practical Guide to Protecting Your Business
Managing Business Risk: A Practical Guide to Protecting Your Business
The balance between risk and reward is the very essence of business: you have to take risks in order to generate returns and, generally speaking, higher returns involve greater risks. However, there is a difference between risks taken as a result of careful judgement and those taken unwittingly.

In a world of
...
Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)
Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)

The second edition of Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today. The tip-of-the-spear technologies that are shaping the future are also addressed.

...
The XP Files:  Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration
The XP Files: Windows' Hidden Tools for Secure Sharing, Communication, and Collaboration

XP's Best-Kept Secrets--Revealed!

During the past decade, Microsoft has created the some of the best Internet communication programs in the world and has installed them on every Windows computer--free, but mostly hidden. Until now, only a few knowledgeable computer users knew how to exploit the potential of these programs--and understood...

Encyclopedia of the Solar System, Second Edition
Encyclopedia of the Solar System, Second Edition
Long before Galileo published his discoveries about Jupiter, lunar craters, and the Milky Way in the Starry Messenger in 1610, people were fascinated with the planets and stars around them. That interest continues today, and scientists are making new discoveries at an astounding rate. Ancient lake beds on Mars, robotic spacecraft missions, and...
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy