You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing ta
The classic reference work that provides annually updated information on the countries of the world.
This book explores the Italian stock exchange through its construction and consolidation while examining and criticizing the birth of the capital city. Through the evolution of the stock exchange, the transformation of Rome is examined from the capital of a pre-unification state to the papal state, exploring its social, political, administrative and financial fabric. The book examines that path to becoming the capital of Italy, offering a unique volume for researchers, academics, and students of financial history and financial markets.
This book presents a selection of the best papers from the HEaRT 2015 conference, held in Lisbon, Portugal, which provided a valuable forum for engineers and architects, researchers and educators to exchange views and findings concerning the technological history, construction features and seismic behavior of historical timber-framed walls in the Mediterranean countries. The topics covered are wide ranging and include historical aspects and examples of the use of timber-framed construction systems in response to earthquakes, such as the gaiola system in Portugal and the Bourbon system in southern Italy; interpretation of the response of timber-framed walls to seismic actions based on calcula...
This book provides a vivid biography of a towering Italian banker, pioneer and entrepreneur. It weaves the entrepreneurial ventures of Alessandro Torlonia (1800-1886) through the narratives of business and politics in the Nineteenth century, the growth of European financial markets and the decline of Papal power during the Italian Risorgimento. The discussion is founded in rigorous historical research using original sources such as the Archivum Secretum Vaticanum papers and other official documents; the archives of the Torlonia family, and of the Rothschild bank in Paris; memoirs; correspondences, and newspapers. Through this book readers learn that Alessandro Torlonia was a man of many face...
Coppa provides the first full-length study of Giacomo Antonelli, friend and advisor to Pope Pius IX (Pio Nono) and his Secretary of State and chief minister from 1849 to 1876. Based on the documents of the secret Vatican Archives, and neglected family papers in the State Archive in Rome, the book gives an important reevaluation of this key diplomatic figure, separating the man from the myth and delving into his character and policies. The book examines both the personality and policies of the Cardinal, who was seen to be the Popes Richelieu and Mazarin combined. Confronting the polemical literature which has charged him with sexual misconduct and venality, the study examines his early formation and career, the inspiration for his European policies, his relationship to Pio Nono, and the part he played in the Counter-Risorgimento and the Papal reaction. By improving our understanding of Papal, Italian, and European developments during these crucial decades, this study provides new insights into Romes fortress mentality and its rejection of the main currents that were transforming western life currents that influenced not only the Catholic Church but European society as a whole.
The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic