Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

MORE Electronic Gadgets for the Evil Genius: 40 NEW Build-it-Yourself Projects
MORE Electronic Gadgets for the Evil Genius: 40 NEW Build-it-Yourself Projects
This much anticipated follow-up to the wildly popular cultclassic Electronic Gadgets for the Evil Genius gives basement experimenters 40 all-new projects to tinker with. Following the tried-and-true Evil Genius Series format, each project includes a detailed list of materials, sources for parts, schematics, documentation, and lots of clear,...
The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set
The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set

A comprehensive five-volume reference on the defining conflict of the second half of the 20th century, covering all aspects of the Cold War as it influenced events around the world.

• 1,299 entries covering all facets of the Cold War from its origins to its aftermath, including all political, diplomatic, military,...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
Electronic Gadgets for the Evil Genius : 28 Build-It-Yourself
The do-it-yourself hobbyist market, particularly in the area of electronics, is hotter than ever. This books gives the “evil genius” loads of projects to delve into, from an ultrasonic microphone, to a body heat detector, and all the way to a Star Wars Light Saber. This book makes creating these devices fun, inexpensive, and easy....
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy