Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Windows Vista(TM) Administrator's Pocket Consultant
Windows Vista(TM) Administrator's Pocket Consultant

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows Vista. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to solve problems and get the job done—whether you’re at...

Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition
Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition

The first edition of this book, Chemical Warfare Agents: Toxicity at Low Levels, was published just prior to the terrorist attacks of September 11th, 2001. Reflecting a greater sense of urgency within the field of chemical defense since this event, research related to chemical warfare agents (CWAs) continues to expand at a remarkable...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Encyclopedia of the Hundred Years War
Encyclopedia of the Hundred Years War

Provides clear, concise, and basic descriptions and definitions to over 260 key people, events, and terms relating to the series of conflicts between France and England in the 14th and 15th centuries that later came to be known as the Hundred Years War.

The Encyclopedia of the Hundred Years War provides its users with clear,...

Dirty Little Secrets of World War II: Military Information No One Told You...
Dirty Little Secrets of World War II: Military Information No One Told You...

Dirty Little Secrets of World War II exposes the dark, irreverent, misunderstood, and often tragicomic aspects of military operations during World War II, many of them virtually unknown even to military buffs. Like its successful predecessor, Dirty Little Secrets, Dunnigan and Nofi's new book vividly brings to life all...

Eberron Player's Guide: A 4th Edition D&D Supplement
Eberron Player's Guide: A 4th Edition D&D Supplement

The complete guide to building Eberron(R) characters.

The Eberron Player's Guide presents the film noir world of Eberron from the point of view of the adventurer exploring it. This product includes everything a player needs to create their character for a D&D(R) campaign in
...

Digital Civil War: Confronting the Far-Right Menace
Digital Civil War: Confronting the Far-Right Menace
A frontline account of the social media battles raging between red and blue Americans – and how to find moral clarity in the chaos of digital civil war. 

Are rural white Christians the real Americans? Should teachers be armed or should the Second Amendment be repealed? Is abortion murder or
...
Computer Viruses and Malware (Advances in Information Security)
Computer Viruses and Malware (Advances in Information Security)

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the...

The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
How can I differentiate my products from the competition?
Do customer retention and loyalty programs really work?
How do I increase a customer’s lifetime value to my company?
How can I build a strong brand and manage it wisely?

To find the answers to these and scores of other questions, turn to the experts at...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy