Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The History of Terrorism: From Antiquity to al Qaeda
The History of Terrorism: From Antiquity to al Qaeda
This authoritative work provides an essential perspective on terrorism by offering a rare opportunity for analysis and reflection at a time of ongoing violence, chilling threats, and renewed reprisals. In it, some of the best international specialists working on the subject today examine terrorism's long and complex history from antiquity to the...
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...

Cyber Warfare and Cyber Terrorism (Premier Reference)
Cyber Warfare and Cyber Terrorism (Premier Reference)
The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic...
Battlespace Technologies: Network-Enabled Information Dominance (Artech House Intelligence and Information Operations)
Battlespace Technologies: Network-Enabled Information Dominance (Artech House Intelligence and Information Operations)

The era of mechanized warfare is rapidly giving way to the battle for information superiority enabled by electronic technologies that provide data for detailed analysis of enemy forces and capabilities. Supported with over 400 color photographs and illustrations, this new book is written and designed specifically to help non-specialists...

Beginning Game Development with Python and Pygame: From Novice to Professional
Beginning Game Development with Python and Pygame: From Novice to Professional
Like music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you've yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you've been spending a lot of time thinking about a game idea of your own, or...
Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social
...
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict

The 1999 conflict between India and Pakistan near the town of Kargil in contested Kashmir was the first military clash between two nuclear-armed powers since the 1969 Sino-Soviet war. Kargil was a landmark event not because of its duration or casualties, but because it contained a very real risk of nuclear escalation. Until the Kargil...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

X3D: Extensible 3D Graphics for Web Authors (The Morgan Kaufmann Series in Interactive 3D Technology)
X3D: Extensible 3D Graphics for Web Authors (The Morgan Kaufmann Series in Interactive 3D Technology)
In the early days of the Web a need was recognized for a language to display 3D objects through a browser. An HTML-like language, VRML, was proposed in 1994 and became the standard for describing interactive 3D objects and worlds on the Web. 3D Web courses were started, several best-selling books were published, and VRML continues to be used today....
The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy