4 results (0,12554 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Robot Souls Programming in Humanity

In Search of Lost Time

In Search of Lost Time

Do you know that black holes can affect time?that Stonehenge is a giant calendar?that the Oracle Bones of the North China Plain predict the phases of the moon?that the Pyramids are giant compasses?how Jonathan Swift knew that Mars had two moons when he wrote Gulliver's Travels?that the effects of black holes are described in the story of Alice in Wonderland?that an atomic reactor existed 2 billion years ago in Equatorial Africa?that an electron on the other side of the galaxy can deflect a billiard ball?that Schr dingers cat is both alive and dead?Derek York fathoms these and many other mysteries of time and space in In Search of Lost Time. A reflection of York's obsession with time and its measurement the book discusses the mind-bending universe of the special and general theories of relativity the ghostly world of quantum mechanics and the unpredictable haunts of chaos. It explores the pyramids of Egypt Stonehenge and the South China plain; the universities of Cambridge McGill and Chicago; the Patent Office in Berne; and back to the Ethiopian desert on the banks of the Awash River. Companions to share and illuminate the path range from Jonathan Swift's Gulliver's Travels and Lewis Carroll's Alice in Wonderland to J. B. Priestley's Dangerous Corner. It also presents the father of master-spy Kim Philby in the Empty Quarter of Arabia the fantasist Velikovsky in the clouds and Newton Darwin Rutherford Einstein and the great Earth scientists of this century who fathomed the depths of lost time and discovered the age of the Earth. Written in an engaging nontechnical style this book will delight and amaze all who encounter it.

GBP 110.00
1

Ransomware and Cybercrime

Ransomware and Cybercrime

In May 2021 Jim Gosler known as the Godfather and commander of US agencies’ cyber offensive capability said ''Either the Intelligence Community (IC) would grow and adapt or the Internet would eat us alive. '' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless nameless state-sponsored or individual cybercriminal to replicate against an unwary ill-protected and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led all in the name of security. This book covers many cyber and ransomware attacks and events including how we have gotten to the point of massive digital utilisation particularly during the global lockdown and COVID-19 pandemic to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution and with the IC themselves suffering cyberattacks they are all blamed on being sophisticated ones of course. We are witnessing the undermining of our entire way of life our economies and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need—no we must demand—change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals. | Ransomware and Cybercrime

GBP 29.99
1

Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques. The book provides an understanding of the basic concepts and rules that need to be followed in protective services including what comprises good security practice. This second edition is fully updated to include new case scenarios threat vectors and new ambush ploys and attack tactics used by opportunistic predators and seasoned threat actors with ever-advanced sophisticated schemes. Security has always been a necessity for conducting business operations in both low- and high-risk situations regardless of the threat level in the operating environment. Overseas those with new ideas or businesses can frequently be targets for both political and criminal threat agents intent on doing harm. Even in the United States people become targets because of positions held publicity politics economics or other issues that cause unwanted attention to a person their family or business operations. Security Operations Second Edition provides an introduction to what duties a security detail should perform and how to effectively carry out those duties. The book can be used by a person traveling with a single bodyguard or someone being moved by a full security detail. FEATURES • Identifies what can pose a threat how to recognize threats and where threats are most likely to be encountered • Presents individuals and companies with the security and preparedness tools to protect themselves when operating in various environments especially in high-risk regions • Provides an understanding of operational security when in transit: to vary route selection and keep destinations and movement plans out of the public view • Outlines the tools and techniques needed for people to become security conscious and situationally aware for their own safety and the safety of those close to them An equal help to those just entering the protection business or people and companies that are considering hiring a security detail Security Operations is a thorough detailed and responsible approach to this serious and often high-risk field. Robert H. Deatherage Jr. is a veteran Special Forces Soldier and private security consultant with thirty years’ experience in military and private security operations. His various writings on security topics cover security operations threat assessment risk management client relations surveillance detection counter surveillance operations foot and vehicle movements and building security—blending solid operational theory with practical field experience. | Security Operations An Introduction to Planning and Conducting Private Security Details for High-Risk Areas

GBP 58.99
1