Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Social History of Byzantium
A Social History of Byzantium
Western civilization owes an incalculable cultural and historical debt to the Byzantine Empire. Before falling to the Ottoman Turks in the mid-fifteenth century, the empire flourished for more than a thousand years, bridging the ancient and modern worlds. Byzantium profoundly influenced the pattern of cultural and political development in the lands...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One
The Accidental Guerrilla: Fighting Small Wars in the Midst of a Big One
David Kilcullen is one of the world's most influential experts on counterinsurgency and modern warfare. A Senior Counterinsurgency Advisor to General David Petraeus in Iraq, his vision of war dramatically influenced America's decision to rethink its military strategy in Iraq and implement "the surge."

Now, in The Accidental...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Introducing Microsoft  Windows Vista
Introducing Microsoft Windows Vista
Your insider's preview of the next release of Microsoft Windows.

What's new and improved in the newest release of the Microsoft Windows family of client operating systems? Which versions of Windows Vista are right for you and your organization? How will the new features and capabilities in Windows Vista improve security, make users more
...
A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters (Prima's Official Strategy Guide)
Freedom Fighters is a game of tactical combat, or what some like to refer as a thinking shooter. Unlike most shooter games, which send a player through an essentially linear course, killing everything in sight, or others that require the player to find special keys or cards to get through a locked door, Freedom Fighters lets the player concentrate...
Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...

Cyber Warfare and Cyber Terrorism (Premier Reference)
Cyber Warfare and Cyber Terrorism (Premier Reference)
The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic...
Credibility: How Leaders Gain and Lose It, Why People Demand It
Credibility: How Leaders Gain and Lose It, Why People Demand It

The first true revision of the classic book from the bestselling author of The Leadership Challenge

As the world falls deeper into economic downturns and warfare, the question of credibility (how leaders gain and lose it) is more important than ever. Building on their research from The Leadership Challenge, James...

Data and Applications Security XVII: Status and Prospects
Data and Applications Security XVII: Status and Prospects
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new...
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy