Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think
PDF
Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think

Just Say No to Microsoft begins by tracing Microsoft's rise from tiny software startup to monopolistic juggernaut and explains how the company's practices over the years have discouraged innovation, stunted competition, and helped foster an environment ripe for viruses, bugs, and hackers. Readers learn how they can dump Microsoft products--even the Windows operating system--and continue to be productive. The book also shows how to wo...

51I312IgUjL._SY291_BO1,204,203,200_QL40_
PDF
Maintaining Arctic Cooperation with Russia : Planning for Regional Change in the Far North

This report examines potential transformations that could alter Russia’s current cooperative stance in the Arctic. It analyzes current security challenges related to climate and geography, economy, territorial claims, and military power, suggests some ways in which these could undermine Arctic cooperation, and offers recommendations for the U.S. government to manage the risks to cooperation.

Blade's Guide to Making Knives
PDF
Blade's Guide to Making Knives

Not only does this book contain information about making blades, but it also has a lot of detailed information about making other parts of the complete knife. Some of the techniques are more advanced, such as lost wax casting, but this is a great resource for the beginner who wants to craft a more complicated knife than a simple piece of steel with a sharp edge. The photographs are plentiful, clear and in color, and add a lot of info...

Recounting the Anthrax Attacks : Terror, the Amerithrax Task Force, and the Evolution of Forensics in the FBI
PDF
Recounting the Anthrax Attacks

It was September 18, 2001, just seven days after al-Qaeda hijackers destroyed the Twin Towers. In the early morning darkness, a lone figure dropped several letters into a mailbox. Seventeen days later, a Florida journalist died of inhalational anthrax. The death from the rare disease made world news. These anthrax attacks marked the first time a sophisticated biological weapon was released in the United States. It killed five people,...

Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
PDF
Secure Your Node.js Web Application

"If you want to learn how to secure your Node.js apps, there's no way around Karl Düüna's book. In a clear and concise manner the author shows the ins and outs of making your Node.js app an impenetrable fortress. Not a Node.js user? No problem - much of what's covered in Karl Düüna's book can be used in other environments with little change."

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
PDF
Computer Security, Privacy and Politics

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politi...

Collecting Case Knives: Identification and Price Guide
PDF
Collecting Case Knives: Identification and Price Guide

Mr. Pfeiffer is a well-known authority on Case knives. His book covers all the major Case patterns, with an emphasis on the period from the end of World War II to the present. These are the knives that are most available and priced at a level that many collectors can afford. What sets this book apart is the quality of the photographs. A lot of reference works are printed on cheap stock with grainy black and white photographs. This bo...

Information Security Governance: Framework and Toolset for CISOs and Decision Makers
PDF
Information Security Governance

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

Kevin Mitnick, William L. Simon, Steve Wozniak, "L'art de la supercherie"
PDF
L'art de la supercherie

Dans cet ouvrage, Kevin Mitnick vous propose de découvrir des scénarios réalistes d'arnaques et d'escroqueries, tous basés sur l'art de la persuasion et de la manipulation. Mitnick démontre que l'homme doit être au centre de la politique de protection des données : aucun pare-feu ou protocole de cryptage ne sera jamais assez efficace pour arrêter des individus déterminés à pénétrer un réseau ou à obtenir une information confidentiell...

Bash Pocket Reference: Help for Power Users and Sys Admins ( 2nd Edition )
PDF
Bash Pocket Reference: Help for Power Users and Sys Admins ( 2nd Edition )

It’s simple: if you want to interact deeply with Mac OS X, Linux, and other Unix-like systems, you need to know how to work with the Bash shell. This concise little book puts all of the essential information about Bash right at your fingertips. You’ll quickly find answers to the annoying questions that generally come up when you’re writing shell scripts: What characters do you need to quote? How do you get variable substitution to do...