Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Daring Missions of World War II
Daring Missions of World War II

Few World War II stories are more gripping than those fought behind enemy lines by spies, underground members, and special forces.

In his latest collection, Daring Missions of World War II, popular author and distinguished historian William Breuer brings to light largely unknown stories of behind-the-scenes bravery and covert...

How Digital Photography Works (2nd Edition)
How Digital Photography Works (2nd Edition)
A full-color, illustrated adventure into the high-tech wonders inside your digital camera by the author/illustrator team that created the bestselling How Computers Work.

 

With clear and simple explanations that say, “You, too, can understand this,” and brilliant,...

The Ankarana Plateau in Madagascar: Tsingy, Caves, Volcanoes and Sapphires (Cave and Karst Systems of the World)
The Ankarana Plateau in Madagascar: Tsingy, Caves, Volcanoes and Sapphires (Cave and Karst Systems of the World)

The book describes the Ankarana plateau and its cave network in Madagascar, depicting the natural environment of the Plateau as well as the natural processes which created the cave network of more than 100km with many galleries, some are very large and draped with different cave formations and underground rivers are inhabited with...

Electromagnetic Transients in Power Cables (Power Systems)
Electromagnetic Transients in Power Cables (Power Systems)

From the more basic concepts to the most advanced ones where long and laborious simulation models are required, Electromagnetic Transients in Power Cables provides a thorough insight into the study of electromagnetic transients and underground power cables. Explanations and demonstrations of different electromagnetic transient...

Inside the Spam Cartel
Inside the Spam Cartel

Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and...

Geological Fluid Dynamics: Sub-surface Flow and Reactions
Geological Fluid Dynamics: Sub-surface Flow and Reactions
This book is the long-awaited successor to Owen Phillips's classic textbook, Flow and Reactions in Permeable Rocks, published in 1991. In the intervening 18 years between the two, significant advances have been made to our understanding of subterranean flow, especially through the vast amount of research into underground storage of nuclear waste...
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

Excel by Example: A Microsoft Excel Cookbook for Electronics Engineers
Excel by Example: A Microsoft Excel Cookbook for Electronics Engineers
The spreadsheet has become a ubiquitous engineering tool, and Microsoft Excel is the standard spreadsheet software package. Over the years, Excel has become such a complex program that most engineers understand and use only a tiny part of its power and features. This book is aimed at electronics engineers and technicians in particular, showing them...
Lineman and Cablemans Field Manual, Second Edition
Lineman and Cablemans Field Manual, Second Edition
A Compact, On-the-Job Reference for Linemen and Cablemen

Fully updated with the latest NEC and OSHA standards, this one-stop portable guide contains the crucial electrical data, formulas, calculations, and safety information essential at any jobsite. The Lineman's and Cableman's Field Manual, Second Edition,...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

 
Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy