Computer Security Literacy: Staying Safe in a Digital World
PDF
Computer Security Literacy: Staying Safe in a Digital World

"… a practical, application-oriented introduction to security education and literacy. While the information is technical enough to provide value to information systems professionals, the organization around specific topics makes it accessible to non-technical users looking for information on specific issues. … the book would be appropriate for an upper-division introductory course on information security … a good book for use in educ...

Managing Energy Security : An All Hazards Approach to Critical Infrastructure
PDF
Managing Energy Security : An All Hazards Approach to Critical Infrastructure

This interdisciplinary book is written for government and industry professionals who need a comprehensive, accessible guide to modern energy security. Introducing the ten predominant energy types, both renewable and non-renewable, the book illustrates the modern energy landscape from a geopolitical, commercial, economic and technological perspective. Energy is presented as the powerhouse of global economic activities. To ensure the u...

Small Arms for Urban Combat
PDF
Small Arms for Urban Combat

The urbanization of warfare has necessitated the kind of precision targeting that only small arms can deliver. Weapons not often seen on the battlefield can prove useful, even indispensible, in an urban setting. This expert reference guide examines in detail the most successful small arms in use and how changes in warfare have affected how those weapons are used and have transformed the small arms industry. Professional soldiers, law...

The Orphan Tsunami of 1700: Japanese Clues to a Parent Earthquake in North America
PDF
The Orphan Tsunami of 1700

"Paddling around the salt marshes and tidal flats of Washington State, Atwater discovered evidence of earthquakes and giant waves of a magnitude that seemed, to many, inconceivable―until late last year, when a tsunami of similar power tore across the Indian Ocean, killing more than 200,000."―Time Magazine, naming Brian Atwater one of the world's 100 most influential people of 2005

Take Control of Your Passwords, 3rd Edition
PDF
Take Control of Your Passwords, 3rd Edition

The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like "What is your pet's favorite movie?", and making sure your passwords are always available when needed. Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes a dozen different apps, with a focus on t...

Artificial Immune System: Applications in Computer Security
PDF
Artificial Immune System: Applications in Computer Security

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information o...

Gun Digest Big Fat Book of the .45 A.C.P.
PDF
Gun Digest Big Fat Book of the .45 A.C.P.

Everything you've ever wanted to know about America's favorite handgun cartridge! Designed nearly a century ago, the .45 ACP cartridge has earned a well-deserved reputation as a superbly accurate, slap-em-down handgun cartridge. An honored veteran of two World Wars, Korea, Vietnam and lesser conflicts across the globe, the .45 ACP is now more popular than ever for competition shooting, law enforcement and self-defense. Now, just in t...

John Taffins Book of the.44
PDF
John Taffins Book of the.44

Once again, John Taffin has nailed it. Like his other fine books, the "Book of the .44" is interesting, informative, and entertaining. It is filled with excellent black and white photos which clearly detail the author's descriptions. Mr. Taffin is obviously an expert on handguns and lever action rifles, and this book contains lots of information on both, as they relate to the development and evolution of the .44 caliber cartridge and...

Hacking Exposed Wireless: Wireless Security Secrets & Solutions
PDF
Hacking Exposed Wireless: Wireless Security Secrets & Solutions

The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest deve...

Network Defense and Countermeasures: Principles and Practices
PDF
Network Defense and Countermeasures: Principles and Practices

Learn how to • Understand essential network security concepts, challenges, and careers n Learn how modern attacks work • Discover how firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs) combine to protect modern networks n Select the right security technologies for any network environment n Use encryption to protect information • Harden Windows and Linux systems and keep them patched n Securely configure...