77 products were found matching your search for countermeasures in 3 shops:
-
Countermeasures (Forbidden Borders #3)
Vendor: Abebooks.com Price: 96.45 $In the stunning conclusion to Gear's remarkable sci-fi trilogy, the rift between father and son—both trained killing machines—will reach an explosive climax. The Forbidden Borders—an unassailable gravity-powered barrier—confines rival human empires to a few star systems, leaving them to strive endlessly against one another for domination. Now the long-dreaded final war between Rega and Sassa, the last surviving empires, has been fought, and Staffa kar Therma, Lord Commander of the Companions, the finest of mercenary soldiers, is struggling to keep what remains of human civilization alive long enough to find a way to break free of the alien-created Forbidden Borders. But Staffa’s own son and former enemy hasn’t decided whether to stand against the Lord Commander or to rally to Staffa’s cause. And the only two women Staffa has ever loved may soon become his unwitting betrayers as pawns of the one opponent who will stop at nothing to destroy the Lord Commander. Yet beyond all these dangers waits the greatest challenge of Staffa’s career—the Mag Comm, the alien-created computer that has spread its net through all of human-inhabited space. The Mag Comm, which could make Staffa its unwilling slave—or free all of mankind from this alien prison.
-
Electronic Countermeasures
Vendor: Abebooks.com Price: 30.00 $boards are rubbed and edge worn. light marks. one stamp. inside , the book is damp stained and wavy. a heavy copy, may require extra postage unless posted within South Africa. fair condition.[SK]. Our orders are shipped using tracked courier delivery services.
-
Surveillance Countermeasures: A Serious Guide to Detecting, Evading, and Eluding Threats to Personal Privacy
Vendor: Abebooks.com Price: 34.87 $Learn to detect and evade surveillance efforts that threaten your personal security. These time-tested tactics of observation, detection and evasion are proven effective against the most sophisticated surveillance techniques used in the world.
-
Theory to Countermeasures Against New Radars
Vendor: Abebooks.com Price: 220.95 $Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 2.01
-
Surveillance Countermeasures: A Serious Guide to Detecting, Evading, and Eluding Threats to Personal Privacy
Vendor: Abebooks.com Price: 78.01 $Learn to detect and evade surveillance efforts that threaten your personal security. These time-tested tactics of observation, detection and evasion are proven effective against the most sophisticated surveillance techniques used in the world.
-
Network Defense and Countermeasures: Principles and Practices (Pearson It Cybersecurity Curriculum (Itcc))
Vendor: Abebooks.com Price: 35.56 $Exact ISBN match. Immediate shipping. No funny business. Pics available upon request.
-
Guide to Network Defense and Countermeasures
Vendor: Abebooks.com Price: 179.99 $Guide to Network Defense and Countermeasures, 2E is the second of two books that are required for Level One of the Security Certified Program (SCP). This edition has been revised with updated content and maps clearly to the exam objectives for the current Security Certified Network Professional (SCNP) exam. Although the primary emphasis is on intrusion detection, the book also covers such essential practices as developing a security policy and then implementing that policy by performing Network Address Translation, setting up packet filtering, and installing proxy servers, firewalls, and virtual private networks.
-
Network Defense and Countermeasures: Principles and Practices (Pearson IT Cybersecurity Curriculum (ITCC))
Vendor: Abebooks.com Price: 100.65 $Buy with confidence! Book is in new, never-used condition 2.09
-
Network Radar Countermeasure Systems
Vendor: Abebooks.com Price: 156.28 $This is the very first book to present the network radar countermeasure system. It explains in detail the systematic concept of combining radar and radar countermeasures from the perspective of the information acquisition of target location, the optimization of the reconnaissance and detection, the integrated attack of the signals and facilities, and technological and legal developments concerning the networked system. It achieves the integration of the initiative and passivity, detection and jamming. The book explains how the system locates targets, completes target identification, tracks targets and compiles the data.
-
Ethical Hacking: Techniques, Tools, and Countermeasures
Vendor: Abebooks.com Price: 68.08 $BRAND NEW! Books are accepted for return within 30 days. Allow 5 - 14 business days for Standard Shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses "No Expedited Shipping" allow 4-28 business days. We do not currently ship internationally.
-
Retaliation: Japanese Attacks and Allied Countermeasures on the Pacific Coast in World War II (Oregon State Monographs: Studies in History)
Vendor: Abebooks.com Price: 57.69 $Published 1975 Oregon State University
-
Ethical Hacking and Countermeasures: Web Applications and Data Servers, 2nd Edition (EC-Council Press Series)
Vendor: Abebooks.com Price: 62.66 $The EC-Council Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C EH certification exam from EC-Council.
-
Technical Surveillance Countermeasures: A quick, reliable & straightforward guide to bug sweeping
Vendor: Abebooks.com Price: 38.47 $This book derives from a bug sweeping course for which people still travel from across the globe to attend and now, accompanies an online training programme. Mainly concentrating on the scientific theory and practical application of technical surveillance countermeasures, this guide can be used as a good learning tool and long term reference book.
-
Ethical Hacking and Countermeasures: Secure Network Infrastructures (EC-Council Press)
Vendor: Abebooks.com Price: 98.58 $The EC-Council Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.
-
Network Defense and Countermeasures: Principles and Practices (Pearson IT Cybersecurity Curriculum (ITCC))
Vendor: Abebooks.com Price: 67.47 $some wear on cover,clean inside,fast ship
-
Risk Analysis and Security Countermeasure Selection
Vendor: Abebooks.com Price: 63.98 $This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies and technologies for addressing existing and future threats. It covers risk analysis methodologies approved by the U.S. Department of Homeland Security and shows how to apply them to other organizations, public and private. It also helps the reader understand which methodologies are best to use for a particular facility and demonstrates how to develop an efficient security system. Drawing on over 35 years of experience in the security industry, Thomas L. Norman provides a single, comprehensive reference manual for risk analysis, countermeasure selection, and security program development. The security industry has a number of practitioners and consultants who lack appropriate training in risk analysis and whose services sometimes suffer from conflicts of interest that waste organizations’ money and time. Norman seeks to fill the void in risk analysis training for those security consultants, thereby reducing organizations’ wasting of resources and potential vulnerability. This book helps you find ways to minimize cost and time spent in analyzing and countering security threats. Risk Analysis and Security Countermeasure Selection, Second Edition gives invaluable insight into the risk analysis process while showing how to use analyses to identify and create the most cost efficient countermeasures. It leads you from a basic to an advanced level of understanding of the risk analysis process. The case studies illustrate how to put each theory into practice, including how to choose and implement countermeasures and how to create budgets that allow you to prioritize assets according to their relative risk and select appropriate countermeasures according to their cost effectiveness.
-
Network Radar Countermeasure Systems: Integrating Radar and Radar Countermeasures
Vendor: Abebooks.com Price: 142.49 $This is the very first book to present the network radar countermeasure system. It explains in detail the systematic concept of combining radar and radar countermeasures from the perspective of the information acquisition of target location, the optimization of the reconnaissance and detection, the integrated attack of the signals and facilities, and technological and legal developments concerning the networked system. It achieves the integration of the initiative and passivity, detection and jamming. The book explains how the system locates targets, completes target identification, tracks targets and compiles the data.
-
Technical Surveillance Countermeasures: A quick, reliable & straightforward guide to bug sweeping
Vendor: Abebooks.com Price: 43.61 $This book derives from a bug sweeping course for which people still travel from across the globe to attend and now, accompanies an online training programme. Mainly concentrating on the scientific theory and practical application of technical surveillance countermeasures, this guide can be used as a good learning tool and long term reference book.
-
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
Vendor: Abebooks.com Price: 45.92 $Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported
-
Hacking VoIP: Protocols, Attacks, and Countermeasures
Vendor: Abebooks.com Price: 2.97 $Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishingAudit VoIP network securityAssess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and VonageUse common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAXIdentify the many vulnerabilities in any VoIP networkWhether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.
77 results in 0.217 seconds
Related search terms
© Copyright 2025 shopping.eu