You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In 2007 an underwater survey of the coral reef system off Bahia de la Ascension (Punta Allen, Mexico) discovered 26 anomalies among the reef, ranging from "man-made geometric patterns" to "unusual shadows" to "unusual bottom disturbances" to "possible debris fields." It is the search for and the analysis of the impact of these 26 anomalies that is the subject of this report. A Maritime Education and Research Society (MERS) Diving Team, supported by the Mexican Instituto Nacional de Antropología e Historia, Subdirección de Arqueología Subacuática (INAH) and the Sian Ka'an Biosphere Reserve re-visited the area nine years later to inspect these 26 sites to ensure that the reef system remained healthy despite the findings of such anomalies, many of which were clearly man-made and resting on the reef.
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order t
Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I deliv
A snapshot in time. After thousands of hours of research and data entry over a 35-year period, the information on the disposition of some 25,000 US Navy, US Marine Corps and US Coast Guard aircraft needs to be published. These aircraft mainly represent those built and lost during World War II - between 7 December 1941 and 15 August 1945 - but this book also contains aircraft built before WWII that were lost during WWII or disposed of after WWII (lost during the Korean War, lost on training exercises, sold to private investors, currently located in museums and even some still proudly sitting as "gate guards" across the US, etc.).
We are a gathering of extraordinary individuals who met under extraordinary circumstances. Coming of age in a small high school in Morocco decades ago, we have something unique in common, and decades later it has somehow never left us. We are the Sultans of Thomas Mack Wilhoite/Kenitra American High School. Be it the first graduating class of three Seniors in 1956 to the last Class of 1976, our experiences as students were sharply tuned to our environment. We were not strangers in a strange land; we were welcomed by the Moroccan people as if we were visiting relatives. The sights, sounds, tastes and smells of Morocco were absorbed by hundreds of students no matter what span of years we were there. We can all relate, and laugh at, similar experiences of our teenage years growing up in and around Kenitra/Port Lyautey, Mehdia Beach, Rabat, and other nearby military bases. Within this book are the memories of those days as told by the former students and teachers of our school.
An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with an increased emphasis on mobile devices and technologies, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.
Nearly 20 years ago, in December 1992, I submitted this research in partial fulfillment of a requirement for my Doctor of Philosophy degree in Security Administration at Southwest University located in Kenner (New Orleans), LA. The title of my research was initially called "Terrorist and Hostile Intelligence Actions Against Computer Resources." Much of what I said 20 years ago still rings true today: the terrorists are getting smarter and the proliferation of viruses and their use by foreign countries and in wartime situations comes to mind. This book is basically divided into four sections: The Destruction of Computer Resources By Terrorist Groups: An Historical Perspective; Hackers and Hostile Intelligence Agents as Computer Terrorists; Computer Resources Being Used By Terrorists; and Methodology to Reduce the Vulnerability to Your Computer Center.
Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professiona
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and i
Whether you are a professional licensed investigator or have been tasked by your employer to conduct an internal investigation, Investigations in the Workplace gives you a powerful mechanism for engineering the most successful workplace investigations possible. Corporate investigator Eugene Ferraro, CPP, CFE has drawn upon his twenty-four years of