Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition
Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition

The first edition of this book, Chemical Warfare Agents: Toxicity at Low Levels, was published just prior to the terrorist attacks of September 11th, 2001. Reflecting a greater sense of urgency within the field of chemical defense since this event, research related to chemical warfare agents (CWAs) continues to expand at a remarkable...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Encyclopedia of the Hundred Years War
Encyclopedia of the Hundred Years War

Provides clear, concise, and basic descriptions and definitions to over 260 key people, events, and terms relating to the series of conflicts between France and England in the 14th and 15th centuries that later came to be known as the Hundred Years War.

The Encyclopedia of the Hundred Years War provides its users with clear,...

Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)
Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)

How manufacturing textiles and guns transformed the United States from colonial dependent to military power.

In 1783, the Revolutionary War drew to a close, but America was still threatened by enemies at home and abroad. The emerging nation faced tax rebellions, Indian warfare, and hostilities with France and...

Dirty Little Secrets of World War II: Military Information No One Told You...
Dirty Little Secrets of World War II: Military Information No One Told You...

Dirty Little Secrets of World War II exposes the dark, irreverent, misunderstood, and often tragicomic aspects of military operations during World War II, many of them virtually unknown even to military buffs. Like its successful predecessor, Dirty Little Secrets, Dunnigan and Nofi's new book vividly brings to life all...

Eberron Player's Guide: A 4th Edition D&D Supplement
Eberron Player's Guide: A 4th Edition D&D Supplement

The complete guide to building Eberron(R) characters.

The Eberron Player's Guide presents the film noir world of Eberron from the point of view of the adventurer exploring it. This product includes everything a player needs to create their character for a D&D(R) campaign in
...

Computer Viruses and Malware (Advances in Information Security)
Computer Viruses and Malware (Advances in Information Security)

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the...

The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
The Guru Guide to Marketing: A Concise Guide to the Best Ideas from Today's Top Marketers
How can I differentiate my products from the competition?
Do customer retention and loyalty programs really work?
How do I increase a customer’s lifetime value to my company?
How can I build a strong brand and manage it wisely?

To find the answers to these and scores of other questions, turn to the experts at...

Wireless Data Demystified (Mcgraw-Hill Demystified Series)
Wireless Data Demystified (Mcgraw-Hill Demystified Series)
UNDERSTAND WIRELESS DATA COMPLETELY, EASILY WITH WIRELESS DATA DEMYSTIFIED

Wireless subscribers are up, but revenue per subscriber isn’t – and it isn’t going to be unless wireless service providers can provide more than plain-vanilla voice services. The road to successful deployment of data services...

Cyber Conflict: Competing National Perspectives
Cyber Conflict: Competing National Perspectives

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy