 |
|
|
|
 Cyber Conflict: Competing National Perspectives
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how... |  |  Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and... |  |  Panther vs T-34: Ukraine 1943 (Duel)
Robert A. Forczyk provides a riveting and intense description of the design and development of these two deadly opponents, the Panther and the T-34, analyzing their strengths and weaknesses and describing their tactics, weaponry and training. Moreover he gives an insight into the lives of the tank crews themselves, who were caught up in the... |
|
 Computer Viruses For DummiesBuild up your defenses against online germ warfare
Discover how viruses work and how to outsmart the cyber-thugs who create them
Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your... |  |  Battling for Competitive AdvantagePraise for Business as War
"Kenneth Allard has provided a tremendous public service with his superb book, Business as War: Battling for Competitive Advantage. Colonel Allard demonstrates the thoughtful and balanced thinking that made him such an effective intelligence officer. Ken Allard also systematically unravels and explains the... |  |  |
|
 The History of Terrorism: From Antiquity to al QaedaThis authoritative work provides an essential perspective on terrorism by offering a rare opportunity for analysis and reflection at a time of ongoing violence, chilling threats, and renewed reprisals. In it, some of the best international specialists working on the subject today examine terrorism's long and complex history from antiquity to the... |  |  |  |  Ew 103, Tactical Battlefield communications Electronic WarfareThis is the third book in the EW 100 series. Like the two earlier books, it is based on the EW 101 series of tutorial articles in the Journal of Electronic Defense. However, this book focuses on the practical aspects of electronic warfare against enemy communications signals
The target audiences for this book, like the earlier two, are... |
|
 |  |  Encyclopedia of Espionage, Intelligence and SecurityIn composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.
EEIS is not intended as a classical “spy book,” filled with... |  |  |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |