Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Research on Information Security and Assurance
Handbook of Research on Information Security and Assurance

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...

Contagion and Chaos: Disease, Ecology, and National Security in the Era of Globalization
Contagion and Chaos: Disease, Ecology, and National Security in the Era of Globalization
Historians from Thucydides to William McNeill have pointed to the connections between disease and civil society. Political scientists have investigated the relationship of public health to governance, introducing the concept of health security. In Contagion and Chaos, Andrew Price-Smith offers the most comprehensive examination yet of...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Wiki at War: Conflict in a Socially Networked World
Wiki at War: Conflict in a Socially Networked World
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide
...
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)

Allied Fighting Effectiveness is a collection of scholarly papers focusing on a variety of different aspects of the major campaigns of North Africa, Sicily and Italy, ranging from operation TORCH to the end of the war in Europe.

...
Embedded Control Systems in C/C++: An Introduction for Software Developers Using MATLAB
Embedded Control Systems in C/C++: An Introduction for Software Developers Using MATLAB

Implement proven design techniques for control systems without having to master any advanced mathematics. Using an effective step-by-step approach, this book presents a number of control system design techniques geared toward readers of all experience levels. Mathematical derivations are avoided, thus making the methods accessible to developers...

Basic Research in Information Science And Technology for Air Force Needs
Basic Research in Information Science And Technology for Air Force Needs
The U.S. Air Force, like the other services, is transforming itself into a new type of force with capabilities appropriate for an emerging array of new threats. The Air Force roadmap for transformation, part of the U.S. Air Force Transformation Flight Plan, describes...
  
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy