|
Medevedev's Plan
|
Dr. Richard J. Krickus |
The author addresses the question of how to give Russia a voice but not a veto in a new European security system and provides some provocative recommendations. Most specifically, he proposes that the… |
OL16076136W |
|
The Legend of Sasquatch
|
William T. Prince |
In this action-packed character novel, Sasquatch is not the mythical creature rumored to haunt the forests of North America. He is a young Texan named Clint Buchanan (pronounced “Buck Hannon”) who pr… |
OL16099082W |
|
IT Auditing
|
Robert E. Davis, MBA, CISA, CICA |
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this publication con… |
OL16684848W |
|
Data and Goliath
|
Bruce Schneier |
A primarily U.S.-centric view of the who, what and why of massive data surveillance at the time of the book's publication (2015). |
OL17177390W |
|
Mac OS X and iOS Internals
|
Jonathan Levin |
**An in-depth look into Mac OS X and iOS kernels**
Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded … |
OL17362849W |
|
Cyberjutsu
|
Ben McCarty |
Cyberjutsu is a revolutionary approach to information security based on authentic, formerly classified Ninja scrolls. It synthesizes today's infosec field with the tactics and techniques used by anci… |
OL21686153W |
|
Sleepy People
|
M. B. Goffstein |
The perfect bedtime story. It put our 4 children in the mood to sleep, their mother as well.
"Sleepy people live, where ever there is room, for a little bed.
You may find a family of Sleepy Peop… |
OL4647944W |