SUMMARY: When a mysterious man orchestrates an attack on archaeologist Annja Creed and then offers her an assignment, Annja is baffl ed. But the mission is too intriguing for her t...
Linux firewalls provide capabilities that rival commercial firewalls, and are built upon the powerful Netfilter infrastructure in the Linux kernel. Linux Firewalls: Attack Detectio...
Product DescriptionMatthew Bannon, a poor art student living in New York City, finds a duffel bag filled with diamonds during a chaotic attack at Grand Central Station. Plans for a...
SUMMARY: Today man's mind is under attack by all the leading schools of philosophy. We are told that we cannot trust our senses, that logic is arbitrary, that concepts have no basi...
Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain militar...
Product DescriptionFor two years, Beth Williams has run from the past, and the beast that dwells inside her. She is haunted by memories of being kidnapped and the savage attack tha...
Product DescriptionWhen the world of Armageddon is attacked by orks, the Black Templars Space Marine Chapter are amongst those sent to liberate it. Chaplain Grimaldus and a band of...
From Publishers Weekly When the pilot of a small, two-person plane has a heart attack and dies, Brian has to crash land in the forest of a Canadian wilderness. He has little time t...
EDITORIAL REVIEW: Continuing the saga of the award-winning Xbox™ game! The Spartan-II program has gone public. Tales of super-soldiers fending off thousands of Covenant attacks hav...
SUMMARY: A computer game convention becomes a hunting ground when the monsters from a new game escape and attack two members of the Net Force Explorers in virtual reality. Though n...