Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Slayer's Guide To Derro
The Slayer's Guide To Derro
The derro have long been a mysterious race, hiding in darkness, their presence frequently but a whisper. Brought to the fore in this supplement, their culture, habitats, methods of warfare, and more are detailed in full so as to be usable by game masters and players alike.

The dwarven racesarequitediverse,but perhapsthe most deviant,
...
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Windows Vista(TM) Administrator's Pocket Consultant
Windows Vista(TM) Administrator's Pocket Consultant

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows Vista. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to solve problems and get the job done—whether you’re at...

Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition
Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition

The first edition of this book, Chemical Warfare Agents: Toxicity at Low Levels, was published just prior to the terrorist attacks of September 11th, 2001. Reflecting a greater sense of urgency within the field of chemical defense since this event, research related to chemical warfare agents (CWAs) continues to expand at a remarkable...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Encyclopedia of the Hundred Years War
Encyclopedia of the Hundred Years War

Provides clear, concise, and basic descriptions and definitions to over 260 key people, events, and terms relating to the series of conflicts between France and England in the 14th and 15th centuries that later came to be known as the Hundred Years War.

The Encyclopedia of the Hundred Years War provides its users with clear,...

Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)
Manufacturing Advantage: War, the State, and the Origins of American Industry, 1776–1848 (Studies in Early American Economy and Society from the Library Company of Philadelphia)

How manufacturing textiles and guns transformed the United States from colonial dependent to military power.

In 1783, the Revolutionary War drew to a close, but America was still threatened by enemies at home and abroad. The emerging nation faced tax rebellions, Indian warfare, and hostilities with France and...

Dirty Little Secrets of World War II: Military Information No One Told You...
Dirty Little Secrets of World War II: Military Information No One Told You...

Dirty Little Secrets of World War II exposes the dark, irreverent, misunderstood, and often tragicomic aspects of military operations during World War II, many of them virtually unknown even to military buffs. Like its successful predecessor, Dirty Little Secrets, Dunnigan and Nofi's new book vividly brings to life all...

Eberron Player's Guide: A 4th Edition D&D Supplement
Eberron Player's Guide: A 4th Edition D&D Supplement

The complete guide to building Eberron(R) characters.

The Eberron Player's Guide presents the film noir world of Eberron from the point of view of the adventurer exploring it. This product includes everything a player needs to create their character for a D&D(R) campaign in
...

Digital Civil War: Confronting the Far-Right Menace
Digital Civil War: Confronting the Far-Right Menace
A frontline account of the social media battles raging between red and blue Americans – and how to find moral clarity in the chaos of digital civil war. 

Are rural white Christians the real Americans? Should teachers be armed or should the Second Amendment be repealed? Is abortion murder or
...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy