Jump to content
Sign in to follow this  
Sosoxx

Carti Alex david.

Recommended Posts

Ce cacat e laba asta trista frate?. Daca tot vreti sa cititi, luati de aici titluri:

 

Sven Hassel:

- Legiunea blestemaților (De fordømtes Legion) - 1953

- Blindatele morții (Døden på Larvefødder) - 1958

- Camarazi de front (Frontkammerater) - 1960

- Batalion de marș (Marchbataillon) - 1962

- Gestapo (Gestapo) - 1963

- Monte Cassino (Monte Cassino) - 1963

- Lichidați Parisul (Likvidér Paris) - 1967

- General SS (SS-Generalen) - 1969

- Imperiul iadului (Kommando Reichsführer Himmler) - 1971 ISBN 0-304-36690-0

- Moarte și viscol (Jeg saa dem dö) - 1976

- Drum sîngeros către moarte (Glemt af Gud) - 1977

- Curtea marțială (Krigsret) - 1979

- Închisoarea OGPU (GPU-Fængslet) - 1981

- Comisarul (The Commissar) - 1985

 

Robert Ludlum:

- Identitatea lui Bourne (1980)

- Supremația lui Bourne (1986)

- Ultimatumul lui Bourne (1990)

- Testamentul lui Holcfroft

- Cercul Matarese

- Numărătoare inversă Matarese

- Opțiunea Paris

- Codul Altman

- Conspirația Spirala

- Decepția lui Prometeu

- Trădarea lui Tristan

- Complotul generalilor

- Directiva Janson

- Drumul spre Omaha - The Road to Omaha

- Manuscrisul lui Chancelor

- Proiectul Hades

- Protocolul Sigma

- Ținutul Magic

- Trădarea lui Tristan

 

  • Thanks 2
  • Upvote 1

Share this post


Link to post
Share on other sites

@aelius face reclama de cacat=)), la ce preturi au cartile respective imi cumpar prezervative durex si fut o luna :)). Cum sa saruti, cum sa le abordezi, omg ce shit :))))))))

  • Upvote 2

Share this post


Link to post
Share on other sites

Chiar ca: daca stai sa citesti cartile astea nu treci de laba.

Ca tot suntem pe security si cum @aelius a amintit de sven hassel luati de aici:

You must be logged in to see the content.

Descriere:

Description

Product description

 

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.

This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

 

Review

 

"A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications

 

From the Back Cover

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors―our defenses must be ready all the time and our alert systems must detect the threats every time.

About the Author

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics. 

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.

Edited by gigiRoman
  • Thanks 1
  • Upvote 2

Share this post


Link to post
Share on other sites
2 hours ago, aelius said:

Ce cacat e laba asta trista frate?.

Quote

Apoi buzele devin mai moi si aplici inca un pupic care poate sa dureze ceva mai mult. E romantic daca e lent. La urmatorul intredeschizi buzele si pupicul e pe cale sa devina sarut in toata regula. Daca n-ai facut-o inca, acum e cazul sa inclini capul astfel incat nasul tau sa se aseze de-o parte a nasului partenerului sau partenerei. Nu de alta, dar e greu sa te saruti daca-ti stau doua nasuri in cale! Daca buzele se intredeschid si sunt lasate moi, ele se vor umezi usor cu saliva. Sarutul devine umed. Ce poti face cu buzele? Poti saruta buza inferioara sau pe cea superioara, in orice ordine vrei. Le poti saruta pe amandoua. Poti prinde intre buze una din buzele partenerului si poti trage foarte putin, usurel apoi sa-i dai drumul. Poti chiar sa-i tragi buza in gura ta. Dar atentie, fa-o cu masura sa nu doara. Sarutul trebuie sa fie ceva placut. Ce mai poti face e sa-ti plimbi buzele umede foarte fin peste buzele partenerului/partenerei. E momentul in care poate sa intervina limba. Gurile se deschid mai mult si voi va apropiati. Ce faci cu limba? Poti scoate putin limba si sa-i mangai buzele la exterior dar si pe partea dinauntrul gurii. Buzele raman in contact. Limba iti va patrunde in gura partenerului unde va intalni limba sa. Atunci incepi sa-i magai limba cu a ta. Da, e vorba de o mangaiere intre limbi. Partenerul/a iti va raspunde si va incerca la randu-i sa faca la fel. Atunci iti retragi limba si limba lui/ei iti va patrunde in gura si se va juca cu limba ta. Va puteti juca sau mangaia cu varful limbii sau ceva mai profund. Miscarile pot fi haotice, de rotatie, lente, sau ceva mai rapide…

wtf.. o carte cum sa o freci corespunzator oare exista? =))

  • Upvote 2

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×