Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Conflict: Competing National Perspectives
Cyber Conflict: Competing National Perspectives

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Panther vs T-34: Ukraine 1943 (Duel)
Panther vs T-34: Ukraine 1943 (Duel)

Robert A. Forczyk provides a riveting and intense description of the design and development of these two deadly opponents, the Panther and the T-34, analyzing their strengths and weaknesses and describing their tactics, weaponry and training. Moreover he gives an insight into the lives of the tank crews themselves, who were caught up in the...

Computer Viruses For Dummies
Computer Viruses For Dummies

Build up your defenses against online germ warfare

Discover how viruses work and how to outsmart the cyber-thugs who create them

Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your...

Battling for Competitive Advantage
Battling for Competitive Advantage
Praise for Business as War

"Kenneth Allard has provided a tremendous public service with his superb book, Business as War: Battling for Competitive Advantage. Colonel Allard demonstrates the thoughtful and balanced thinking that made him such an effective intelligence officer. Ken Allard also systematically unravels and explains the...

Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks

The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
...

The History of Terrorism: From Antiquity to al Qaeda
The History of Terrorism: From Antiquity to al Qaeda
This authoritative work provides an essential perspective on terrorism by offering a rare opportunity for analysis and reflection at a time of ongoing violence, chilling threats, and renewed reprisals. In it, some of the best international specialists working on the subject today examine terrorism's long and complex history from antiquity to the...
Self-Defense Nerve Centers and Pressure Points for Karate, Jujitsu and Atemi-Waza
Self-Defense Nerve Centers and Pressure Points for Karate, Jujitsu and Atemi-Waza
A modern definition of self-defense is in order. One way of defining self-defense is to explain what it is not. Personal self-defense is not warfare; it is not vengeance; it is not an art; it is not a sporting event; it is not a movie or television fight scene.

Self-defense is preparation to minimize the possibility of assault. It is
...
Ew 103, Tactical Battlefield communications Electronic Warfare
Ew 103, Tactical Battlefield communications Electronic Warfare
This is the third book in the EW 100 series. Like the two earlier books, it is based on the EW 101 series of tutorial articles in the Journal of Electronic Defense. However, this book focuses on the practical aspects of electronic warfare against enemy communications signals

The target audiences for this book, like the earlier two, are
...
Other Fronts, Other Wars?: First World War Studies on the Eve of the Centennial (History of Warfare)
Other Fronts, Other Wars?: First World War Studies on the Eve of the Centennial (History of Warfare)

Society for First World War Studies. It is a selection of papers from a conference held in Innsbruck in late September 2011.

The society began as a small-scale attempt to bring together an international group of postgraduate and postdoctoral students who work on the First World War in 2001. Over the years, the habit developed
...

Encyclopedia of Espionage, Intelligence and Security
Encyclopedia of Espionage, Intelligence and Security
In composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.

EEIS is not intended as a classical “spy book,” filled with
...
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy