Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...
The Vietnam War: The Definitive Illustrated History
Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.
Honoring those who served in the war at home or abroad,...
Building an FPS Game with Unity
Create a high-quality first person shooter game using the Unity game engine and the popular UFPS and Probuilder frameworks
About This Book
Learn how to use Unity in conjunction with UFPS and ProBuilder to create a high-quality game quickly
Create both interior and exterior...
Protecting SQL Server Data
For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling
"You have a lot of enemies, Hipolito. I heard rumors in jail that some of the people you busted are going to try to kill you, so you better watch yourself." U.S. Special Agent Hipolito Acosta had put lots of thugs in jail, but the death threat from an imprisoned convict was still a shock.
Fabricated: The New World of 3D Printing
Fabricated tells the story of 3D printers, humble manufacturing machines that are bursting out of the factory and into homes, businesses, schools, kitchens, hospitals, even the fashion catwalk. The magic happens when you plug a 3D printer into today's mind-boggling digital technologies. Add to that the Internet, tiny, low cost...
Build Your Own Combat Robot Experience the excitement of building your own champion battling bot!
Build a powerful and invincible robot--for full-blown competition or just for fun--using this authoritative robot resource. This team of experts gives you an inside look at the innovative new world of robotic combat, explaining the origins of the sport as well as all the...
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself The do-it-yourself hobbyist market, particularly in the area of electronics, is hotter than ever. This books gives the “evil genius” loads of projects to delve into, from an ultrasonic microphone, to a body heat detector, and all the way to a Star Wars Light Saber. This book makes creating these devices fun, inexpensive, and easy.... The Next Wave in Computing, Optimization, and Decision Technologies Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the...
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
|Result Page: 9 8 7 6 5 4 3 2 1 |