Secure today’s mobile devices and applications
Thứ Hai, 11 tháng 5, 2015
Chủ Nhật, 15 tháng 3, 2015
Computer Incident Response and Forensics Team Management
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.
Thứ Hai, 2 tháng 3, 2015
A Philosophy of Fear
Surveillance cameras. Airport security lines. Barred store windows. We see manifestations of societal fears everyday, and daily news reports on the latest household danger or raised terror threat level continually stoke our sense of impending doom. In A Philosophy of Fear, Lars Svendsen now explores the underlying ideas and issues behind this powerful emotion, as he investigates how and why fear has insinuated itself into every aspect of modern life.
Thứ Năm, 29 tháng 1, 2015
Critical Infrastructure Protection in Homeland Security
A scientific approach to the new field of critical infrastructure protection
Thứ Hai, 19 tháng 1, 2015
The Rome Affair
Two security experts must work too closely for comfort in Addison Fox’s THE ROME AFFAIR. Jack Andrews has once again snatched a covetable job from the House of Steele. But now that the assignment has gotten complicated, he must call upon the last person he wants to ask for help: Kensington Steele. Jack never flinches at danger, but working side by side with his fascinating, sexy competitor might be more than he can handle…. When the assignment brings them to the Italian vineyard of a corrupt diplomat, Kensington vows to keep things professional. Even if working as a team fans the flames of their mutual desire. But once a murderer begins stalking them, they realize getting close may be the only way they’ll survive…
Chủ Nhật, 28 tháng 12, 2014
US Presidents and the Militarization of Space, 1946-1967
In the clash of ideologies represented by the Cold War, even the heavens were not immune to militarization. Satellites and space programs became critical elements among the national security objectives of both the United States and the Soviet Union.
Thứ Bảy, 27 tháng 12, 2014
Security and Privacy in Smart Grids
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areasmaking it an ideal reference for students, researchers, and engineers in these fields.
Thứ Năm, 25 tháng 12, 2014
Master Your Mac
OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.,
If you want to go beyond the basics, Master Your , will take you there. With tips on everything from organizing your workspace to strengthening your computer’s security, author Matt Cone will show you how to tweak, customize, and control your Mac. And since many of the best tools for unlocking your Mac’s potential don’t come with OS X, you’ll discover the best apps to fix those everyday Apple annoyances and make your computer do things your way.
Thứ Hai, 22 tháng 12, 2014
Linux All-in-One For Dummies, 5th Edition
Linux All-in-One For Dummies explains everything you need to get up and running with the popular , operating system. Written in the friendly and accessible For Dummies style, the book ideal for new and intermediate Linux users, as well as anyone studying for level-1 Linux certification. The eight minibooks inside cover the basics of Linux, interacting with it, networking issues, Internet services, administration, security, scripting, and level-1 certification.,
Including everything beginners need to know to get started with Linux, Linux All-in-One For Dummies, 5th Edition is the ultimate resource and reference for aspiring professionals.
Chủ Nhật, 21 tháng 12, 2014
SQL Server 2005 Management and Administration
Microsoft SQL Server 2005 Management and Administration, based on Service Pack 2, addresses the challenges , administrators regularly encounter on , , 2005 by providing detailed guidance in the areas of management, administration, security, and monitoring. With coverage of the new features and functionality of SQL Server 2005 Service Pack 2, this book is designed to be comprehensive, resulting in something for all database administrators – from simple tips to tactical solutions. Microsoft SQL Server 2005 Management and Administration goes far beyond the basic installation and setup information found in many other resources.
Reporting with Microsoft SQL Server 2012
Starting with the difference between standard and self- service reporting, this book covers the main features and functionality offered in , , Reporting Services 2012 including a breakdown of the report components, development experience, extensibility, and security. You will also learn to set up and use Power View within , and SharePoint and connect to a tabular model as well as a multidimensional model. The book provides real-life reporting scenarios that help to clarify when those scenarios are discussing standard reporting, in which case SSRS is the best choice, and when they are discussing self-service reporting, in which case Power View is the best choice.
Thứ Bảy, 20 tháng 12, 2014
Microsoft SQL Server 2012 Integration Services
Build and manage data integration solutions with expert guidance from the , , , Integration Services (SSIS) team. See best practices in action and dive deep into the SSIS engine, SSISDB catalog, and security features. Using the developer enhancements in SQL Server 2012 and the flexible SSIS toolset, you’ll handle complex data integration scenarios more efficiently – and acquire the skills you need to build comprehensive solutions.
Thứ Hai, 15 tháng 12, 2014
BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration , is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your , perspective in today’s digital age.
AspectJ in Action
A software system is the realization of a set of concerns. One of the central premises of object-oriented , is that each concern should be implemented as a separate module. However, there are certain system-wide concerns, such as logging, security, performance, and so forth, that often need to be addressed in many, if not all of the modules. Consequently, the code to handle these system-wide concerns may be mixed in with the core logic of a huge number of modules, resulting in lower productivity, poor quality, and systems that are hard to evolve.,
Aspect-oriented programming overcomes these problems by modularizing the system-wide concerns.