Home | Amazing | Today | Tags | Publishers | Years | Search 
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
Dictionary of Celtic Mythology (Oxford Paperback Reference)
Dictionary of Celtic Mythology (Oxford Paperback Reference)
The Celts were one of the great founding civilizations of Europe and the first North European people to emerge into recorded history, producing a vibrant labyrinth of mythological tales and sagas that have influenced the literary traditions of Europe and the world.

The first A-Z reference of its kind, Dictionary of Celtic Mythology
...
MORE Electronic Gadgets for the Evil Genius: 40 NEW Build-it-Yourself Projects
MORE Electronic Gadgets for the Evil Genius: 40 NEW Build-it-Yourself Projects
This much anticipated follow-up to the wildly popular cultclassic Electronic Gadgets for the Evil Genius gives basement experimenters 40 all-new projects to tinker with. Following the tried-and-true Evil Genius Series format, each project includes a detailed list of materials, sources for parts, schematics, documentation, and lots of clear,...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Architecting Software Intensive Systems: A Practitioners Guide
Architecting Software Intensive Systems: A Practitioners Guide
Today our civilization is highly dependent upon software-intensive systems. Software-intensive systems are those systems that are highly dependent upon computing infrastructure and software for the basic functionality they provide and the properties they possess. Architecture design of software-intensive systems as a separate and distinct...
Creating Game Art for 3D Engines (Game Development)
Creating Game Art for 3D Engines (Game Development)
Learn how to create commercial-quality game art and make it come alive in a 3D engine! "Creating Game Art for 3D Engines" is the ideal guide for the serious student or aspiring animator who wants to learn how to create and successfully export game art, from simple shapes to full-blown characters. Using Autodesk® 3ds Max® to...
Fuzzy Logic with Engineering Applications
Fuzzy Logic with Engineering Applications

Fuzzy logic is a simple phrase that actually refers to a large subject dealing with a set of methods to characterize and quantify uncertainty in engineering systems that arise from ambiguity, imprecision, fuzziness, and lack of knowledge.

This 15-chapter textbook remains the only major text that can be used for both undergraduate...

Technology: A World History (New Oxford World History)
Technology: A World History (New Oxford World History)
Today technology has created a world of dazzling progress, growing disparities of wealth and poverty, and looming threats to the environment. Technology: A World History offers an illuminating backdrop to our present moment--a brilliant history of invention around the globe. Historian Daniel R. Headrick ranges from the Stone Age and the beginnings...
Do Good Design: How Designers Can Change the World
Do Good Design: How Designers Can Change the World
How did design help choose a president?

Why are people buying houses they cannot afford?

Why do U.S. car makers now struggle to compete? Why do we really have an environmental crisis?

Design matters. Like never before.


Disarming the weapons of mass deception....
Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy