Home | Amazing | Today | Tags | Publishers | Years | Search 
Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)
Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...

Computer Assisted Exercises and Training: A Reference Guide
Computer Assisted Exercises and Training: A Reference Guide

A comprehensive guide to computer assisted exercises

Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large...

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Handbook of Research on Information Security and Assurance
Handbook of Research on Information Security and Assurance

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...

Credibility: How Leaders Gain and Lose It, Why People Demand It
Credibility: How Leaders Gain and Lose It, Why People Demand It

The first true revision of the classic book from the bestselling author of The Leadership Challenge

As the world falls deeper into economic downturns and warfare, the question of credibility (how leaders gain and lose it) is more important than ever. Building on their research from The Leadership Challenge, James...

Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe's Future
Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe's Future

Although overshadowed by his contemporaries Adam Smith and David Hume, the Scottish philosopher Adam Ferguson strongly influenced eighteenth-century currents of political thought. A major reassessment of this neglected figure, Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe’s Future sheds new light on...

Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks

The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
...

The Ancient Sailing Season (Mnemosyne Supplements History and Archaeology of Classical Antiquity) (Latin Edition)
The Ancient Sailing Season (Mnemosyne Supplements History and Archaeology of Classical Antiquity) (Latin Edition)

A comprehensive examination of the effects of the shifting seasons on maritime trade, warfare and piracy durig antiquity, this book overturns many long-held assumptions concerning the capabilities of Graeco-Roman ships and sailors.

It is the long-standing belief among classical scholars that seafaring on the ancient Mediterranean
...
Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...

Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)
Allied Fighting Effectiveness in North Africa and Italy, 1942-1945 (History of Warfare)

Allied Fighting Effectiveness is a collection of scholarly papers focusing on a variety of different aspects of the major campaigns of North Africa, Sicily and Italy, ranging from operation TORCH to the end of the war in Europe.

...
Other Fronts, Other Wars?: First World War Studies on the Eve of the Centennial (History of Warfare)
Other Fronts, Other Wars?: First World War Studies on the Eve of the Centennial (History of Warfare)

Society for First World War Studies. It is a selection of papers from a conference held in Innsbruck in late September 2011.

The society began as a small-scale attempt to bring together an international group of postgraduate and postdoctoral students who work on the First World War in 2001. Over the years, the habit developed
...

Game Theory: An Introduction
Game Theory: An Introduction

An exciting new edition of the popular introduction to game theory and its applications

The thoroughly expanded Second Edition presents a unique, hands-on approach to game theory. While most books on the subject are too abstract or too basic for mathematicians, Game Theory: An Introduction, Second...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy