![](https://www.pdfchm.net/pic/empty.gif) |
|
![](https://pic.pdfchm.net/empty.gif) Practical Hacking Techniques and CountermeasuresExamining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.
It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) System Software Reliability (Springer Series in Reliability Engineering)Computer software reliability has never been more important. Today, computers are employed in areas as diverse as air traffic control, nuclear reactors, aircraft, real-time military, industrial process control, security system control, biometric scan-systems, automotive, mechanical and safety control, and hospital patient monitoring systems. Many... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Violence at Sea: Piracy in the Age of Global TerrorismViolence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China... |
|
|
|
|
Result Page: Previous 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 Next |