15 Results for : funneling

  • Thumbnail
    Harmony Wells thought she had her life figured out. On the fast track to a successful nursing career, the last thing she needed or wanted in her life was a man. That all changes when she finds a wounded black bear in the middle of the woods while out jogging. She’s determined to help, even after she finds out that nothing is as it seems.Rhett Parker, reclusive billionaire and shifter, spends his days funneling money down south to pay for a secret war between shifters. A war the rest of the world knows nothing about. The Bears are the last thing that stands between the Wolves and a war like the world has never known. He’s managed to keep his true identity a secret his whole life, but the woman who finds him near death and nurses him back to health goes straight to the heart of him.Attraction sizzles and flares between Harmony and Rhett. Is it possible that Rhett’s Mate could be a human? Can he find a way into Harmony’s heart before he loses her completely? Danger and intrigue are closer to home than ever before, as the Wolves hunt down Rhett to finish what they started. Harmony unwittingly puts herself right in the line of fire. Will she and Rhett find a happily ever after and a way to end the war between shifters? ungekürzt. Language: English. Narrator: Piper Ivanov. Audio sample: https://samples.audible.de/bk/acx0/180664/bk_acx0_180664_sample.mp3. Digital audiobook in aax.
    • Shop: Audible
    • Price: 9.95 EUR excl. shipping
  • Thumbnail
    My Detachment is a war story like none you have ever read before, an unromanticized portrait of a young man coming of age in the controversial war that defined a generation. In an astonishingly honest, comic, and moving account of his tour of duty in Vietnam, master storyteller Tracy Kidder writes for the first time about himself. This extraordinary memoir is destined to become a classic. Kidder was an ROTC intelligence officer, just months out of college and expecting a stateside assignment, when his orders arrived for Vietnam. There, lovesick, anxious, and melancholic, he tried to assume command of his detachment, a ragtag band of eight more-or-less ungovernable men charged with reporting on enemy radio locations. He eventually learned not only to lead them but to laugh and drink with them as they shared the boredom, pointlessness, and fear of war. Together, they sought a ghostly enemy, homing in on radio transmissions and funneling intelligence gathered by others. Kidder realized that he would spend his time in Vietnam listening in on battle but never actually experiencing it. With remarkable clarity and with great detachment, Kidder looks back at himself from across three and a half decades, confessing how, as a young lieutenant, he sought to borrow from the tragedy around him and to imagine himself a romantic hero. Unrelentingly honest, rueful, and revealing, My Detachment gives us war without heroism, while preserving those rare moments of redeeming grace in the midst of lunacy and danger. The officers and men of My Detachment are not the sort of people who appear in war movies, they are the ones who appear only in war, and they are unforgettable. ungekürzt. Language: English. Narrator: Tracy Kidder. Audio sample: https://samples.audible.de/bk/rand/000658/bk_rand_000658_sample.mp3. Digital audiobook in aax.
    • Shop: Audible
    • Price: 9.95 EUR excl. shipping
  • Thumbnail
    From Kamery Solomon, #1 best-selling genre author and creator of the bestselling series The God Chronicles, comes SWEPT AWAY, a time travel romance fraught with danger and secrets on the high seas!  Dead men tell no tales...  For more than 200 years, the Treasure Pit on Oak Isle has baffled treasure hunters, engineers, and the common man alike. When Samantha Greene arrives, she finds her estranged father has spent years funneling energy and finances into the endeavor, finding nothing. When an accidental death occurs in the pit, fulfilling the prophecy that seven lives must end before the treasure can be found, the search kicks into high gear, with more than one party vying for the secrets that lie below. Finding herself the closest to the treasure anyone has ever been, Samantha throws herself into the work, landing among the coveted prize. Just as she's about to discover what's truly hidden beneath the island, the pit begins to flood with ocean water, sweeping her away despite her attempts to swim to the surface. Upon awaking, Samantha discovers that, not only did she not drown, but the year is 1695—one hundred years before the Treasure Pit was even discovered. Carried off by the pirate Tristan O'Rourke, a rouge Irishman with more than his share of secrets, she soon finds that there is much more than she realized in play. Will she discover the secrets of Oak Isle, or will an unexpected love keep her from finding out the truth? Will she ever make it back to her own time? Perhaps the real question is this; will she want to?  ungekürzt. Language: English. Narrator: Rhiannon Angell. Audio sample: https://samples.audible.de/bk/acx0/118860/bk_acx0_118860_sample.mp3. Digital audiobook in aax.
    • Shop: Audible
    • Price: 9.95 EUR excl. shipping
  • Thumbnail
    While mainstream media pundits touted Hillary Clinton's inevitable coronation as president in 2016, AFP staunchly stood alone, warning that her and Bill's inexcusable crimes against women, rampant corruption, and illegal weapons trafficking in Benghazi would ultimately bring about her demise. Whereas conservative news outlets such as Fox hint at various scandals, they don't possess the courage to expose those issues which AFP has regularly covered for the past decade. For example, AFP published Hillary (and Bill), a trilogy that devoted entire chapters to the Clinton body count, their involvement in cocaine distribution at the Mena, Ark. airport, and Bill's blood-curdling rape of Juanita Broaddrick. More recently, AFP lead the pack in regard to covering taboo topics. While liberal lapdogs at MSNBC and CNN begrudgingly referred to a so-called videotape that supposedly incited the Benghazi attacks, AFP revealed in full detail how CIA operatives and those at Clinton's State Dept. broke international law by funneling heavy armaments from Libya to Syria. Similarly, Mrs. Clinton cannot escape the fact that she deliberately lied to the families of those slain in Benghazi, an unforgivable practice that she continues to this day. Or, when major network anchors stop at the adulterous Monica Lewinsky affair, AFP blew the lid off of Bill Clinton's sordid trips to Pedophile Island with convicted billionaire Jeffrey Epstein. Likewise, since day one AFP highlighted Hillary's Chicago-style quid pro quo tactics as Sec. of State in which she diverted millions of dollars through political cronyism to the Clinton Foundation. Lastly, instead of trying to bury Hillary's email fiasco, AFP realized that a pattern of deception stretching back 40 years would be her Achilles heel. One simple fact should be clear: Hillary Clinton should not be crowned as the 45th president of this country. ungekürzt. Language: English. Narrator: James Justus. Audio sample: https://samples.audible.de/bk/acx0/079122/bk_acx0_079122_sample.mp3. Digital audiobook in aax.
    • Shop: Audible
    • Price: 9.95 EUR excl. shipping
  • Thumbnail
    A guide on the OSSEC Host-based Intrusion Detection system. It shows how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems. -- Stephen NorthcuttOSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC.* Nominee for Best Book Bejtlich read in 2008!* http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html. Get Started with OSSECGet an overview of the features of OSSEC including commonly used terminology, pre-install preparation, and deployment considerations. . Follow Steb-by-Step Installation InstructionsWalk through the installation process for the "local, "agent, and "server" install types on some of the most popular operating systems available.. Master ConfigurationLearn the basic configuration options for your install type and learn how to monitor log files, receive remote messages, configure email notification, and configure alert levels.. Work With RulesExtract key information from logs using decoders and how you can leverage rules to alert you of strange occurrences on your network.. Understand System Integrity Check and Rootkit DetectionMonitor binary executable files, system configuration files, and the Microsoft Windows registry.. Configure Active ResponseConfigure the active response actions you want and bind the actions to specific rules and sequence of events.. Use the OSSEC Web User InterfaceInstall, configure, and use the community-developed, open source web interface available for OSSEC.. Play in the OSSEC VMware Environment Sandbox. Dig Deep into Data Log MiningTake the "high art of log analysis to the next level by breaking the dependence on the lists of strings or patterns to look for in the logs.
    • Shop: buecher
    • Price: 62.99 EUR excl. shipping


Similar searches: