Listing 1 - 10 of 449 | << page >> |
Sort by
|
Choose an application
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities. Teaches ISO/IEC 27000 best practices on information security management Discusses risks and controls within the context of an overall information security management system (ISMS) Provides foundational information for experienced professionals as well as those new to the industry.
Choose an application
Computational Frameworks: Systems, Models and Applications provides an overview of advanced perspectives that bridges the gap between frontline research and practical efforts. It is unique in showing the interdisciplinary nature of this area and the way in which it interacts with emerging technologies and techniques. As computational systems are a dominating part of daily lives and a required support for most of the engineering sciences, this book explores their usage (e.g. big data, high performance clusters, databases and information systems, integrated and embedded hardware/software components, smart devices, mobile and pervasive networks, cyber physical systems, etc.).
Choose an application
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials. Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org.
Choose an application
Choose an application
A comprehensive overview of the field, Internet Studies considers key issues of social importance that the study of the Internet draws upon. At the same time, it examines the role of the Internet in social research and the development of highly interdisciplinary and rapidly developing Internet research. Hence, this volume maps out areas of certainty and uncertainty in the study of the Internet and, as such, it will be of interest to scholars and students of media and communication, sociology and social research methods.
Computer. Automation --- Mass communications --- Internet --- Social aspects.
Choose an application
Most geoscientists are aware of recent IT developments, but cannot spend time on obscure technicalities. Few have considered their implications for the science as a whole. Yet the information industry is moving fast: electronic delivery of hyperlinked multimedia; standards to support interdisciplinary and geographic integration; new models to represent and visualize our concepts, and control and manage our activities; plummeting costs that force the pace. To stay on course, the scientist needs a broad appreciation of the complex and profound interactions of geoscience and IT, not previousl
Computer. Automation --- Geology --- Information technology. --- Data processing.
Choose an application
"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh
Computer. Automation --- Computer hackers. --- Computer security.
Choose an application
""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not
Computer. Automation --- Computer hackers --- Short stories.
Choose an application
Using the author's considerable experience of applying Mathcad to engineering problems, Essential Mathcad introduces the most powerful functions and features of the software and teaches how to apply these to create comprehensive calculations for any quantitative subject. The simple, step-by-step approach makes this book an ideal Mathcad text for professional engineers as well as engineering , science, and math students. Examples from a variety of fields demonstrate the power and utility of Mathcad's tools, while also demonstrating how other software, such as Excel spreadsheets, can be incorpor
Mathematical control systems --- Computer. Automation --- Engineering mathematics --- Data processing. --- MathCAD.
Choose an application
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online. Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe
Computer. Automation --- Cyberspace --- Security measures. --- Computer security. --- Internet
Listing 1 - 10 of 449 | << page >> |
Sort by
|