|
|
|
|
The Slayer's Guide To DerroThe derro have long been a mysterious race, hiding in darkness, their presence frequently but a whisper. Brought to the fore in this supplement, their culture, habitats, methods of warfare, and more are detailed in full so as to be usable by game masters and players alike.
The dwarven racesarequitediverse,but perhapsthe most deviant,... | | Hack Proofing Your Web ApplicationsAs a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some... | | Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |
|
|
Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... | | Encyclopedia of the Hundred Years War
Provides clear, concise, and basic descriptions and definitions to over 260 key people, events, and terms relating to the series of conflicts between France and England in the 14th and 15th centuries that later came to be known as the Hundred Years War.
The Encyclopedia of the Hundred Years War provides its users with clear,... | | |
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |