You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Subhash Kapoor was a New York-based antique dealer whose pieces can be seen in every major museum of the world. In October 2011 when he presented his passport at immigration in Germany, Kapoor was unceremoniously whisked away into Interpol custody. India had weeks earlier issued a red-corner notice for his arrest after connecting him to audacious idol thefts in two Tamil Nadu temples. And when the US authorities subsequently raided Kapoor's warehouses in New York more skeletons came tumbling out of his closet. They recovered no less than $100 million worth of stolen Indian art! This was just Kapoor's inventory - he had been in business for close to four decades and the true scale of his loot...
No other bandit in recent times has captured the public's imagination as much as Koose Muniswamy Veerappan. Be it his trademark moustache, stories of his daring escapades or his ruthless massacre of officers, Veerappan continues to fascinate, even thirteen years after his death. Veerappan: Chasing the Brigand is a lucid and incisive account of the rise and fall of India's most dreaded forest brigand. Chronicled by K. Vijay Kumar, IPS, the man who spearheaded the Tamil Nadu Special Task Force (STF) that planned and executed the dreaded bandit's killing, the book relives the various incidents that shaped Veerappan's life - from his birth in Gopinatham in 1952 to his death in 2004 in a shootout in Padi. It traces his dramatic rise from a small-time poacher and sandalwood smuggler to a brutal fugitive who held three states to ransom for two decades. The ruthless killings and high-profile kidnappings masterminded by Veerappan, including the 108-day ordeal involving Kannada cinema superstar, Dr Rajkumar, are described in fascinating detail. Veerappan: Chasing the Brigand is the most authentic account of the life and times of the dreaded outlaw.
The first step-by-step guidebook for successful innovation planning Unlike other books on the subject, 101 Design Methods approaches the practice of creating new products, services, and customer experiences as a science, rather than an art, providing a practical set of collaborative tools and methods for planning and defining successful new offerings. Strategists, managers, designers, and researchers who undertake the challenge of innovation, despite a lack of established procedures and a high risk of failure, will find this an invaluable resource. Novices can learn from it; managers can plan with it; and practitioners of innovation can improve the quality of their work by referring to it.
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then t...
Dr.L.Ramesh, Assistant Professor, Department of Information Technology, Vels Institute of Science, Technology & Advanced Studies (VISTAS),Pallavaram, Chennai, Tamil Nadu, India. Dr.R.Suresh, Assistant Professor, Department of Computer Applications, DRBCCC Hindu College, Pattabiram, Chennai, Tamil Nadu, India. Dr.S.Gopinathan, Professor & Head, Department of Computer Science, Guindy Campus, University of Madras, Chennai, Tamil Nadu, India.
A journey which resonates with millions of aspiring actors and artists. Vijay Kumar meets and shares the screen with his childhood hero The Legend Of Indian Cinema Dev Anand. Taking you on an adventure from his humble beginnings in New Delhi, India, later immigrating to London, England, before returning to Mumbai, India to pursue a career in the largest film industry on the planet. Vijay takes us on a passionate, personal & enthralling journey of perseverance. Through persistence & sheer ambition, Vijay ultimately established a trusting relationship and close personal bond with the legend Dev Anand. An insight into the life in front of & behind the camera, their friendship spans over 30 year...
A PEEK INTO THE MIND OF AN INCREDIBLE MANIPULATOR When a financial fraud is detected in the Treasury branch of ZNI Bank in Delhi, the fingers point at forex dealer Anand Patel, who vehemently denies it. Is he really as innocent as he claims to be or is he hiding something? Slowly, the needle of suspicion moves from Anand to six erstwhile members of the bank’s Matching Team. Is the fraudster one among them or is he or she an outsider? Just when it appears that the investigation is heading nowhere, one of the officials from the bank stumbles upon a seemingly innocuous cue that points to a larger cover-up. As the investigation deepens, several bizarre truths with links to betting emerge. The bank officials realize that this is not a simple case of siphoning money and they are dealing with a brilliant manipulator who has so cleverly covered the tracks. Or has he…?
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systemsDiscover various stealth techniques to remain undetected and defeat modern infrastructuresExplore red teaming techniques to exploit secured environmentBook Description This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. To start with, you'll use a laboratory environment to validate tools and techniques, along with an application ...
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux,...
A comprehensive new edition on mobile computing covering both mobile and sensor data The new paradigm of pervasive computing was born from the needs of highly mobile workers to access and transfer data while on the go. Significant advances in the technology have lent and will continue to lend prevalence to its use especially in m-commerce. Covering both mobile data and sensor data, this comprehensive text offers updated research on sensor technology, data stream processing, mobile database security, and contextual processing. Packed with cases studies, exercises, and examples, Fundamentals of Pervasive Information Management Systems covers essential aspects of wireless communication and prov...