Debugging the Development Process This book might make Microsoft sound bad.
At least that's one of the concerns I had about telling so many Microsoft war stories. I considered softening and smoothing over some of the stories, or leaving them out altogether, but apart from changing people's names, I decided to keep this book and its examples grounded in reality so that it...
Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane...
King Zeno: A Novel
A New York Times Book Review Editors' Choice and a Paris Review Staff Pick
A January Pick by Salon, Town and Country, Southern Living, and LA Magazine
New Orleans, 1918. The birth of jazz, the Spanish flu, an ax murderer on the loose. The lives of a...
Electricity And Magnetism (Physics in Our World) THE NUCLEAR BOMBS that ended World War II in 1945 were a convincing and frightening demonstration of the power of physics. A product of some of the best scientific minds in the world, the nuclear explosions devastated the Japanese cities of Hiroshima and Nagasaki, forcing Japan into an unconditional surrender. But even though the atomic bomb...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
|Result Page: 33 32 31 30 29 28 27 26 25 24 |