Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Acres of Skin: Human Experiments at Holmesburg Prison
Acres of Skin: Human Experiments at Holmesburg Prison
In the first expose of unjust medical experimentation since David Rothman's Willowbrook's Wars, Allen M. Hornblum releases devastating stories from within the walls of Philadelphia's Holmesburg Prison. For more than two decades, from the mid-1950s through the mid-1970s, inmates were used, in exchange for a few dollars, as guinea pigs...
Warriors of Anatolia: A Concise History of the Hittites
Warriors of Anatolia: A Concise History of the Hittites
The Hittites in the Late Bronze Age became the mightiest military power in the Ancient Near East. Yet their empire was always vulnerable to destruction by enemy forces; their Anatolian homeland occupied a remote region, with no navigable rivers; and they were cut off from the sea. Perhaps most seriously, they suffered chronic...
Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and...
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Artillery: An Illustrated History of Its Impact (Weapons and Warfare)
Artillery: An Illustrated History of Its Impact (Weapons and Warfare)
This volume traces the history of artillery and its place in society from the ancient world to the present. The term “artillery” is derived from the Latin ars, or artis, terms for “craft” that later evolved through the Old French atillier, meaning “to deck, adorn with care or arrange”; atil,...
Game Theory: An Introduction
Game Theory: An Introduction

An exciting new edition of the popular introduction to game theory and its applications

The thoroughly expanded Second Edition presents a unique, hands-on approach to game theory. While most books on the subject are too abstract or too basic for mathematicians, Game Theory: An Introduction, Second...

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
EW 102: A Second Course in Electronic Warfare
EW 102: A Second Course in Electronic Warfare
Serving as a continuation of the bestselling book EW 101: A First Course in Electronic Warfare, this new volume is a second installment of popular tutorials featured in the Journal of Electronic Defense. Without delving into complex mathematics, this book gives engineers, defense contractors, managers, and government procurers a basic working...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy