Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization
The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization

Perhaps the preeminent conventional fighting force in the world, the United States Marine Corps owes much of its modern-day success to the adoption of a combat philosophy known as maneuver warfare. Maneuver warfare uses speed, surprise, and concentrated force to exploit an opponent’s weakness and enables the Marines to achieve maximum...

A Social History of Byzantium
A Social History of Byzantium
Western civilization owes an incalculable cultural and historical debt to the Byzantine Empire. Before falling to the Ottoman Turks in the mid-fifteenth century, the empire flourished for more than a thousand years, bridging the ancient and modern worlds. Byzantium profoundly influenced the pattern of cultural and political development in the lands...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One
The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One
David Kilcullen is one of the world's most influential experts on counterinsurgency and modern warfare. A Senior Counterinsurgency Advisor to General David Petraeus in Iraq, his vision of war dramatically influenced America's decision to rethink its military strategy in Iraq and implement "the surge."

Now, in The Accidental...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Introducing Microsoft  Windows Vista
Introducing Microsoft Windows Vista
Your insider's preview of the next release of Microsoft Windows.

What's new and improved in the newest release of the Microsoft Windows family of client operating systems? Which versions of Windows Vista are right for you and your organization? How will the new features and capabilities in Windows Vista improve security, make users more
...
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters is a game of tactical combat, or what some like to refer as a thinking shooter. Unlike most shooter games, which send a player through an essentially linear course, killing everything in sight, or others that require the player to find special keys or cards to get through a locked door, Freedom Fighters lets the player concentrate...
Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...

Cyber Warfare and Cyber Terrorism (Premier Reference)
Cyber Warfare and Cyber Terrorism (Premier Reference)
The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy