American and British 410 Shotguns
PDF
American and British 410 Shotguns

410's are generally lightweight shotguns that produce little kick, making them a popular choice for beginners, youth, or anyone sensitive to recoil. However, their full choke barrels force them to concentrate the available shot, therefore they require the precision of an expert to be effective at any significant distant. Collectors, historians, enthusiasts, and those recapturing their youth will be captivated by this fascinating reco...

The Worst-Case Scenario Survival Handbook: Extreme Edition
PDF
The Worst-Case Scenario Survival Handbook: Extreme Edition

FUNNY, FUNNY, FUNNY.... and informative! A must have for world travelers, explorers or adventuresome people who find themselves in unusual situations (like me)! I bought this as a gift for my psychiatrist and she loved it... of course I had to read it cover to cover before I wrapped and presented it to her!

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies
PDF
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning p...

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
PDF
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

This book is an excellent resource for any software professional. As massive data breaches and security vulnerabilities continue to fill the news, I began to wonder what I should be looking for in my own code to make it more secure. This book meets that need by summarizing the major risks in software security in a readable, to-the-point manner. Each risk is described, and then followed with code samples (in a variety of languages rel...

Aviation Security : Legal and Regulatory Aspects, Reissued Edition
PDF
Aviation Security : Legal and Regulatory Aspects, Reissued Edition

Published in 1998. The various conventions which apply to the subject of unlawful interface with civil aviation have proved effective only to the extent of nurturing existing values of international law as they are restrictively perceived through the parameters of air law. This book examines the offence of unlawful interference with international civil aviation and analyses critically the legal and regulatory regime that applies ther...

Hacking für Manager: IT-Sicherheit für Alle, Die Wenig Ahnung von Computern Haben, 2. Auflage
PDF
Hacking für Manager: IT-Sicherheit für Alle, Die Wenig Ahnung von Computern Haben, 2. Auflage

Die Technik, die uns heute überschwemmt, lässt uns gar keine Chance mehr, alles so abzusichern, dass wir auch wirklich sicher sind. Lernen Sie die Waffen Ihrer Gegner und Ihre eigenen Abwehrmöglichkeiten kennen. Aber keine Sorge, bei diesem Blick in den Giftschrank der IT müssen Sie bei Leibe kein Computerfachmann oder IT Profi sein. Die zweite, erweiterte Auflage mit vielen neuen Beispielen aus dem Technikalltag.

Practical Security: Simple Practices for Defending Your Systems
PDF
Practical Security: Simple Practices for Defending Your Systems

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have a solid foundation if you bring in a dedicated security staff later. Identify the weaknesses in your system, and defend against the a...

Jihadism, Foreign Fighters and Radicalization in the EU : Legal, Functional and Psychosocial Responses
PDF
Jihadism, Foreign Fighters and Radicalization in the EU (Contemporary Terrorism Studies)

Jihadism, Foreign Fighters and Radicalization in the EU addresses the organizational and strategic changes in terrorism in Europe as a result of urban jihadism and the influx of foreign fighters of European nationality or residence.   Examining the different types of responses to the treatment of radicalization and its consequences in the recruitment of young urban fighters and jihadists, this book offers a framework for underst...

Securing the Cloud: Security Strategies for the Ubiquitous Data Center
PDF
Securing the Cloud: Security Strategies for the Ubiquitous Data Center

This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models....

A Guide to Border Control and Patrol
PDF
A Guide to Border Control and Patrol

The government reports included in this book range from June to September 2018 and examine US border control and security. The first report is focused on the Department of Homeland Security. The Department of Homeland Security (DHS) was established by the Homeland Security Act of 2002 and began operations in 2003. This report examines the Department of Homeland Securitys (DHS) Office of Strategy, Policy and Plans as well as its Sub-O...