Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
Beginning Game Development with Python and Pygame: From Novice to Professional
Beginning Game Development with Python and Pygame: From Novice to Professional
Like music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you've yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you've been spending a lot of time thinking about a game idea of your own, or...
Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social
...
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict

The 1999 conflict between India and Pakistan near the town of Kargil in contested Kashmir was the first military clash between two nuclear-armed powers since the 1969 Sino-Soviet war. Kargil was a landmark event not because of its duration or casualties, but because it contained a very real risk of nuclear escalation. Until the Kargil...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

X3D: Extensible 3D Graphics for Web Authors (The Morgan Kaufmann Series in Interactive 3D Technology)
X3D: Extensible 3D Graphics for Web Authors (The Morgan Kaufmann Series in Interactive 3D Technology)
In the early days of the Web a need was recognized for a language to display 3D objects through a browser. An HTML-like language, VRML, was proposed in 1994 and became the standard for describing interactive 3D objects and worlds on the Web. 3D Web courses were started, several best-selling books were published, and VRML continues to be used today....
The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

The Ancient Sailing Season (Mnemosyne Supplements History and Archaeology of Classical Antiquity) (Latin Edition)
The Ancient Sailing Season (Mnemosyne Supplements History and Archaeology of Classical Antiquity) (Latin Edition)

A comprehensive examination of the effects of the shifting seasons on maritime trade, warfare and piracy durig antiquity, this book overturns many long-held assumptions concerning the capabilities of Graeco-Roman ships and sailors.

It is the long-standing belief among classical scholars that seafaring on the ancient Mediterranean
...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy