The "Gun Digest" Book of Tactical Gear
PDF
The "Gun Digest" Book of Tactical Gear

The Gun Digest Book of Tactical Gear is the complete tactical gear reference, with complete listings of knives, flashlights, vests, tactical sights and optics and more, with select firearms and other weapons covered with the applicable gear. This everything guide includes: Articles from the top experts in the field A detailed where to find the gear guide Catalog listings of items covered

Microsoft Encyclopedia of Security
PDF
Microsoft Encyclopedia of Security

As a new student to the realm of security I've been hit hard with new terminology and after a while sometimes I find it hard to rememberr what an acronym stands for or what it means. This book makes it easy to look it up quickly for a refresher without having to flip through various books or search the internet. Great if you are a student like myself and working late at night cramming for an exam and you can't remember what PFS stand...

Handbook of Electronic Security and Digital Forensics
PDF
Handbook of Electronic Security and Digital Forensics

The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It ...

Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think
PDF
Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think

Just Say No to Microsoft begins by tracing Microsoft's rise from tiny software startup to monopolistic juggernaut and explains how the company's practices over the years have discouraged innovation, stunted competition, and helped foster an environment ripe for viruses, bugs, and hackers. Readers learn how they can dump Microsoft products--even the Windows operating system--and continue to be productive. The book also shows how to wo...

51I312IgUjL._SY291_BO1,204,203,200_QL40_
PDF
Maintaining Arctic Cooperation with Russia : Planning for Regional Change in the Far North

This report examines potential transformations that could alter Russia’s current cooperative stance in the Arctic. It analyzes current security challenges related to climate and geography, economy, territorial claims, and military power, suggests some ways in which these could undermine Arctic cooperation, and offers recommendations for the U.S. government to manage the risks to cooperation.

Blade's Guide to Making Knives
PDF
Blade's Guide to Making Knives

Not only does this book contain information about making blades, but it also has a lot of detailed information about making other parts of the complete knife. Some of the techniques are more advanced, such as lost wax casting, but this is a great resource for the beginner who wants to craft a more complicated knife than a simple piece of steel with a sharp edge. The photographs are plentiful, clear and in color, and add a lot of info...

Recounting the Anthrax Attacks : Terror, the Amerithrax Task Force, and the Evolution of Forensics in the FBI
PDF
Recounting the Anthrax Attacks

It was September 18, 2001, just seven days after al-Qaeda hijackers destroyed the Twin Towers. In the early morning darkness, a lone figure dropped several letters into a mailbox. Seventeen days later, a Florida journalist died of inhalational anthrax. The death from the rare disease made world news. These anthrax attacks marked the first time a sophisticated biological weapon was released in the United States. It killed five people,...

Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
PDF
Secure Your Node.js Web Application

"If you want to learn how to secure your Node.js apps, there's no way around Karl Düüna's book. In a clear and concise manner the author shows the ins and outs of making your Node.js app an impenetrable fortress. Not a Node.js user? No problem - much of what's covered in Karl Düüna's book can be used in other environments with little change."

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
PDF
Computer Security, Privacy and Politics

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politi...