Books

7 results found
Title Authors Description OpenBook ID
Medevedev's Plan Medevedev's Plan Dr. Richard J. Krickus The author addresses the question of how to give Russia a voice but not a veto in a new European security system and provides some provocative recommendations. Most specifically, he proposes that the… OL16076136W
The Legend of Sasquatch The Legend of Sasquatch William T. Prince In this action-packed character novel, Sasquatch is not the mythical creature rumored to haunt the forests of North America. He is a young Texan named Clint Buchanan (pronounced “Buck Hannon”) who pr… OL16099082W
IT Auditing IT Auditing Robert E. Davis, MBA, CISA, CICA "IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this publication con… OL16684848W
Data and Goliath Data and Goliath Bruce Schneier A primarily U.S.-centric view of the who, what and why of massive data surveillance at the time of the book's publication (2015). OL17177390W
Mac OS X and iOS Internals Mac OS X and iOS Internals Jonathan Levin **An in-depth look into Mac OS X and iOS kernels** Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded … OL17362849W
Cyberjutsu Cyberjutsu Ben McCarty Cyberjutsu is a revolutionary approach to information security based on authentic, formerly classified Ninja scrolls. It synthesizes today's infosec field with the tactics and techniques used by anci… OL21686153W
Sleepy People Sleepy People M. B. Goffstein The perfect bedtime story. It put our 4 children in the mood to sleep, their mother as well. "Sleepy people live, where ever there is room, for a little bed. You may find a family of Sleepy Peop… OL4647944W