Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

The Vietnam War: The Definitive Illustrated History
The Vietnam War: The Definitive Illustrated History

Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.

Honoring those who served in the war at home or abroad,...

Building an FPS Game with Unity
Building an FPS Game with Unity

Create a high-quality first person shooter game using the Unity game engine and the popular UFPS and Probuilder frameworks

About This Book

  • Learn how to use Unity in conjunction with UFPS and ProBuilder to create a high-quality game quickly
  • Create both interior and exterior...
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling

"You have a lot of enemies, Hipolito. I heard rumors in jail that some of the people you busted are going to try to kill you, so you better watch yourself." U.S. Special Agent Hipolito Acosta had put lots of thugs in jail, but the death threat from an imprisoned convict was still a shock.


Acosta recounts
...

Fabricated: The New World of 3D Printing
Fabricated: The New World of 3D Printing

Fabricated tells the story of 3D printers, humble manufacturing machines that are bursting out of the factory and into homes, businesses, schools, kitchens, hospitals, even the fashion catwalk. The magic happens when you plug a 3D printer into today's mind-boggling digital technologies. Add to that the Internet, tiny, low cost...

Build Your Own Combat Robot
Build Your Own Combat Robot
Experience the excitement of building your own champion battling bot!

Build a powerful and invincible robot--for full-blown competition or just for fun--using this authoritative robot resource. This team of experts gives you an inside look at the innovative new world of robotic combat, explaining the origins of the sport as well as all the...

Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
The do-it-yourself hobbyist market, particularly in the area of electronics, is hotter than ever. This books gives the “evil genius” loads of projects to delve into, from an ultrasonic microphone, to a body heat detector, and all the way to a Star Wars Light Saber. This book makes creating these devices fun, inexpensive, and easy....
The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy