Tag: Offensive

The Tet Offensive A Concise History


Free Download James Willbanks, "The Tet Offensive: A Concise History"
English | 2006 | pages: 297 | ISBN: 0231128401 | PDF | 2,8 mb
In the Tet Offensive of 1968, Viet Cong and North Vietnamese forces launched a massive countrywide attack on South Vietnam. Though the Communists failed to achieve their tactical and operational objectives, James Willbanks claims Hanoi won a strategic victory. The offensive proved that America’s progress was grossly overstated and caused many Americans and key presidential advisors to question the wisdom of prolonging combat.

(more…)

Offensive and Defensive Cyber Security Strategies (Cyber Shorts)


Free Download Offensive and Defensive Cyber Security Strategies (Cyber Shorts) by Mariya Ouaissa, Mariyam Ouaissa
English | November 22, 2024 | ISBN: 1032833807 | 116 pages | MOBI | 1.25 Mb
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks.

(more…)

Offensive Security Using Python


Free Download Offensive Security Using Python: A hands-on guide to offensive tactics and threat mitigation using practical strategies by Rejah Rehim, Manindar Mohan
English | September 30th, 2024 | ISBN: 1835468160 | 248 pages | True PDF | 14.11 MB
Unlock Python’s hacking potential and discover the art of exploiting vulnerabilities in the world of offensive cybersecurity

(more…)

Spring Offensive Home Front Detective


Free Download Spring Offensive: Home Front Detective by Edward Marston, Gordon Griffin, Soundings
English | June 20, 2024 | ISBN: B0D2DVJ123 | 10 hours and 9 minutes | M4B 64 Kbps | 279 Mb
March, 1918. British newspapers carry the dreadful news that the German Spring Offensive has begun, with thousands of British lives lost. Detective Sargeant Joe Keedy is awaiting release from hospital in London and is anxious to resume the fight against crime on the Home Front.
Late one night, a bank is raided by a gang and the villains escape by car with a sizeable haul. Detective Inspector Harvey Marmion is put in charge of the case, but without Keedy at his side he faces an uphill battle to solve this perplexing case.
(more…)

Combined Round the Clock Bombing Offensive Attacking Nazi Germany (Images of War)


Free Download Combined Round the Clock Bombing Offensive: Attacking Nazi Germany (Images of War) by Philip Kaplan
English | May 19, 2015 | ISBN: 178346304X | 176 pages | PDF | 84 Mb
In World War Two, the most effective fighting units were usually small – submarine crews, infantry platoons, commandos, and bomber crews. Of these it could be said that the men who crewed the bombers caused more damage to the enemy and had a greater impact on the outcome of the conflict than any number of the rest. Most of the aircrews were volunteers (in the RAF, they all were), intelligent, fit, and highly trained. Each knew he was essential to the team; he knew that a mistake by anyone could mean the death of all. Their interdependence was a welding influence.

(more…)

The offensive Internet speech, privacy, and reputation


Free Download The offensive Internet: speech, privacy, and reputation By Saul Levmore, Martha C. Nussbaum (editors)
2011 | 312 Pages | ISBN: 0674050894 | PDF | 2 MB
The Internet has been romanticized as a zone of freedom. The alluring combination of sophisticated technology with low barriers to entry and instantaneous outreach to millions of users has mesmerized libertarians and communitarians alike. Lawmakers have joined the celebration, passing the Communications Decency Act, which enables Internet Service Providers to allow unregulated discourse without danger of liability, all in the name of enhancing freedom of speech. But an unregulated Internet is a breeding ground for offensive conduct.At last we have a book that begins to focus on abuses made possible by anonymity, freedom from liability, and lack of oversight. The distinguished scholars assembled in this volume, drawn from law and philosophy, connect the absence of legal oversight with harassment and discrimination. Questioning the simplistic notion that abusive speech and mobocracy are the inevitable outcomes of new technology, they argue that current misuse is the outgrowth of social, technological, and legal choices. Seeing this clearly will help us to be better informed about our options.In a field still dominated by a frontier perspective, this book has the potential to be a real game changer. Armed with example after example of harassment in Internet chat rooms and forums, the authors detail some of the vile and hateful speech that the current combination of law and technology has bred. The facts are then treated to analysis and policy prescriptions. Read this book and you will never again see the Internet through rose-colored glasses.

(more…)