Filter
(found 11996 products)
Book cover image
How to survive the digital revolution without getting trampled: your guide to online mindfulness, digital self-empowerment, cybersecurity, creepy ads, trustworthy information, and more. Feeling overwhelmed by an avalanche of online content? Anxious about identity theft? Unsettled by the proliferation of fake news? Welcome to the digital revolution. Wait-wasn't the digital ...
Keep Calm and Log On: Your Handbook for Surviving the Digital Revolution
How to survive the digital revolution without getting trampled: your guide to online mindfulness, digital self-empowerment, cybersecurity, creepy ads, trustworthy information, and more. Feeling overwhelmed by an avalanche of online content? Anxious about identity theft? Unsettled by the proliferation of fake news? Welcome to the digital revolution. Wait-wasn't the digital revolution supposed to make our lives better? It was going to be fun and put the world at our fingertips. What happened? Keep Calm and Log On is a survival handbook that will help you achieve online mindfulness and overcome online helplessness-the feeling that tech is out of your control-with tips for handling cybersecurity, creepy ads, untrustworthy information, and much more. Taking a cue from the famous World War II morale-boosting slogan ( Keep Calm and Carry On ), Gus Andrews shows us how to adapt the techniques our ancestors used to survive hard times, so we can live our best lives online. She explains why media and technology stress us out, and offers empowering tools for coping. Mindfulness practices can help us stay calm and conserve our attention purposefully. Andrews shares the secret of understanding our own opinions'' family trees in order to identify misleading fake news. She provides tools for unplugging occasionally, overcoming feelings that we are bad at technology, and taking charge of our security and privacy. Andrews explains how social media algorithms keep us from information we need and why creepy ads seem to follow us online. Most importantly, she urges us to work to rebuild the trust in our communities that the internet has broken.
https://magrudy-assets.storage.googleapis.com/9780262538763.jpg
26.200000 USD

Keep Calm and Log On: Your Handbook for Surviving the Digital Revolution

by Gillian Gus Andrews
Paperback / softback
Book cover image
Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations ...
Building Secure and Reliable Systems: SRE and Security Best Practices
Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. Security is also crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, reliability, and availability. In a world where most products are connected to the internet, and with cloud technologies and machine learning becoming more prevalent, enabling security by default is increasingly important. This book shares best practices to help an organization of any size design scalable and reliable systems that are fundamentally secure. It also offers insights into how teams across an organization can collaborate on security and reliability. Specifically, you'll learn about: Design Strategies Implementation & Operations Preparing for the Worst: Detection & Response Scaling Security and the Organization
https://magrudy-assets.storage.googleapis.com/9781492083122.jpg
104.13 USD

Building Secure and Reliable Systems: SRE and Security Best Practices

by Adam Stubblefield, Piotr Lewandowski, Heather Adkins, Paul Blankinship, Betsy Beyer, Ana Oprea
Paperback / softback
Book cover image
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of ...
Data Protection and Privacy
The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the tenth annual International Conference on Computers, Privacy and Data Protection, CPDP 2017, held in Brussels in January 2017. The book explores Directive 95/46/EU and the GDPR moving from a market framing to a 'treaty-base games frame', the GDPR requirements regarding machine learning, the need for transparency in automated decision-making systems to warrant against wrong decisions and protect privacy, the riskrevolution in EU data protection law, data security challenges of Industry 4.0, (new) types of data introduced in the GDPR, privacy design implications of conversational agents, and reasonable expectations of data protection in Intelligent Orthoses. This interdisciplinary book was written while the implications of the General Data Protection Regulation 2016/679 were beginning to become clear. It discusses open issues, and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.
https://magrudy-assets.storage.googleapis.com/9781509937486.jpg
36.750000 USD

Data Protection and Privacy

Paperback / softback
Book cover image
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the ...
Design and Analysis of Security Protocol for Communication
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.
https://magrudy-assets.storage.googleapis.com/9781119555643.jpg
236.250000 USD

Design and Analysis of Security Protocol for Communication

by O. P. Verma, Sheng-Lung Peng, S Balamurigan, Dinesh Goyal
Hardback
Book cover image
Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing ...
Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership
Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.
https://magrudy-assets.storage.googleapis.com/9781119643777.jpg
26.250000 USD

Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership

by Jennifer Jin, Marcus J. Carey
Paperback / softback
Book cover image
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses ...
Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!
https://magrudy-assets.storage.googleapis.com/9781119577485.jpg
31.490000 USD

Penetration Testing For Dummies

by Robert Shimonski
Paperback / softback
Book cover image
Constructing cybersecurity adopts a constructivist approach to cybersecurity and problematises the state of contemporary knowledge within this field. Setting out by providing a concise overview of such knowledge this book subsequently adopts Foucauldian positions on power and security to highlight assumptions and limitations found herein. What follows is a detailed ...
Constructing Cybersecurity: Power, Expertise and the Internet Security Industry
Constructing cybersecurity adopts a constructivist approach to cybersecurity and problematises the state of contemporary knowledge within this field. Setting out by providing a concise overview of such knowledge this book subsequently adopts Foucauldian positions on power and security to highlight assumptions and limitations found herein. What follows is a detailed analysis of the discourse produced by various internet security companies demonstrating the important role that these security professionals play constituting and entrenching this knowledge by virtue of their specific epistemic authority. As a relatively new source within a broader security dispositif these security professionals have created relationships of mutual recognition and benefit with traditional political and security professionals. -- .
https://magrudy-assets.storage.googleapis.com/9781526123329.jpg
148.77 USD

Constructing Cybersecurity: Power, Expertise and the Internet Security Industry

by Andrew Whiting
Hardback
Book cover image
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a ...
Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralized democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to build out democracy into cyberspace. Webb travels to Berlin, where she visits the Chaos Communication Camp, a flagship event in the hacker world; to Silicon Valley, where she reports on the Apple-FBI case, the significance of Russian troll farms, and the hacking of tractor software by desperate farmers; to Barcelona, to meet the hacker group XNet, which has helped bring nearly 100 prominent Spanish bankers and politicians to justice for their role in the 2008 financial crisis; and to Harvard and MIT, to investigate the institutionalization of hacking. Webb describes an amazing array of hacker experiments that could dramatically change the current political economy. These ambitious hacks aim to displace such tech monoliths as Facebook and Amazon; enable worker cooperatives to kill platforms like Uber; give people control over their data; automate trust; and provide citizens a real say in governance, along with capacity to reach consensus. Coding Democracy is not just another optimistic declaration of technological utopianism; instead, it provides the tools for an urgently needed upgrade of democracy in the digital era.
https://magrudy-assets.storage.googleapis.com/9780262043557.jpg
46.49 USD

Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism

by Maureen Webb
Hardback
Book cover image
This book gathers selected research papers presented at the First International Conference on Embedded Systems and Artificial Intelligence (ESAI 2019), held at Sidi Mohamed Ben Abdellah University, Fez, Morocco, on 2-3 May 2019. Highlighting the latest innovations in Computer Science, Artificial Intelligence, Information Technologies, and Embedded Systems, the respective papers ...
Embedded Systems and Artificial Intelligence: Proceedings of ESAI 2019, Fez, Morocco
This book gathers selected research papers presented at the First International Conference on Embedded Systems and Artificial Intelligence (ESAI 2019), held at Sidi Mohamed Ben Abdellah University, Fez, Morocco, on 2-3 May 2019. Highlighting the latest innovations in Computer Science, Artificial Intelligence, Information Technologies, and Embedded Systems, the respective papers will encourage and inspire researchers, industry professionals, and policymakers to put these methods into practice.
https://magrudy-assets.storage.googleapis.com/9789811509469.jpg
262.490000 USD

Embedded Systems and Artificial Intelligence: Proceedings of ESAI 2019, Fez, Morocco

Paperback / softback
Book cover image
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by ...
Hacking Connected Cars: Tactics, Techniques, and Procedures
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
https://magrudy-assets.storage.googleapis.com/9781119491804.jpg
52.500000 USD

Hacking Connected Cars: Tactics, Techniques, and Procedures

by Alissa Knight
Paperback / softback
Book cover image
This book collects original research papers and survey articles presented at the International Conference on Recent Advances in Pure and Applied Mathematics (ICRAPAM), held at Delhi Technological University, India, on 23-25 October 2018. Divided into two volumes, it discusses major topics in mathematical analysis and its applications, and demonstrates the ...
Mathematical Analysis II - Optimisation, Differential Equations and Graph Theory: ICRAPAM 2018, New Delhi, India, October 23-25
This book collects original research papers and survey articles presented at the International Conference on Recent Advances in Pure and Applied Mathematics (ICRAPAM), held at Delhi Technological University, India, on 23-25 October 2018. Divided into two volumes, it discusses major topics in mathematical analysis and its applications, and demonstrates the versatility and inherent beauty of analysis. It also shows the use of analytical techniques to solve problems and, wherever possible, derive their numerical solutions. This volume addresses major topics, such as multi-objective optimization problems, impulsive differential equations, mathematical modelling, fuzzy mathematics, graph theory, and coding theory. It is a valuable resource to students as well as researchers in mathematical sciences.
https://magrudy-assets.storage.googleapis.com/9789811511561.jpg
167.990000 USD

Mathematical Analysis II - Optimisation, Differential Equations and Graph Theory: ICRAPAM 2018, New Delhi, India, October 23-25

Hardback
Book cover image
Covers critical infrastructure protection, providing a rigorous treatment of risk, resilience, complex adaptive systems, and sector dependence Wide in scope, this classroom-tested book is the only one to emphasize a scientific approach to protecting the key infrastructures components of a nation. It analyzes the complex network of entities that make ...
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Covers critical infrastructure protection, providing a rigorous treatment of risk, resilience, complex adaptive systems, and sector dependence Wide in scope, this classroom-tested book is the only one to emphasize a scientific approach to protecting the key infrastructures components of a nation. It analyzes the complex network of entities that make up a nation's infrastructure, and identifies vulnerabilities and risks in various sectors by combining network science, complexity theory, risk analysis, and modeling and simulation. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, power grid, and Internet and Web networks to a much simpler problem of protecting a few critical nodes. The new third edition of Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation incorporates a broader selection of ideas and sectors than the previous book. Divided into three sections, the first part looks at the historical origins of homeland security and critical infrastructure, and emphasizes current policy. The second examines theory and foundations, highlighting risk and resilience in the context of complexity theory, network science, and the prevailing theories of catastrophe. The last part covers the individual sectors, including communications, internet, cyber threats, information technology, social networks, SCADA, water and water treatment, energy, and more. Covers theories of catastrophes, details of how sectors work, and how to deal with the problem of critical infrastructure protection's enormity and complexity Places great emphasis on computer security and whole-community response Includes PowerPoint slides for use by lecturers, as well as an instructor's guide with answers to exercises Offers five robust appendices that augment the non-mathematical chapters with more rigorous explanations and mathematics Critical Infrastructure Protection in Homeland Security, Third Edition is an important book for upper-division undergraduates and first-year graduate students in political science, history, public administration, and computer technology. It will also be of great interest to professional security experts and policymakers.
https://magrudy-assets.storage.googleapis.com/9781119614531.jpg
147.000000 USD

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

by Ted G. Lewis
Hardback
Book cover image
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher ...
Privacy in Dynamical Systems
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.
https://magrudy-assets.storage.googleapis.com/9789811504921.jpg
146.990000 USD

Privacy in Dynamical Systems

Hardback
Book cover image
The only official CCSP practice test product endorsed by (ISC)(2) With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the ...
CCSP Official (ISC)2 Practice Tests
The only official CCSP practice test product endorsed by (ISC)(2) With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by domain allows you to practice only the areas you need to bring you up to par, without wasting precious time on topics you've already mastered. As the only official practice test product for the CCSP exam endorsed by (ISC)(2), this essential resource is your best bet for gaining a thorough understanding of the topic. It also illustrates the relative importance of each domain, helping you plan your remaining study time so you can go into the exam fully confident in your knowledge. When you're ready, two practice exams allow you to simulate the exam day experience and apply your own test-taking strategies with domains given in proportion to the real thing. The online learning environment and practice exams are the perfect way to prepare, and make your progress easy to track.
https://magrudy-assets.storage.googleapis.com/9781119603498.jpg
42.000000 USD

CCSP Official (ISC)2 Practice Tests

by Ben Malisow
Paperback / softback
Book cover image
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, ...
Quantum Cryptography and the Future of Cyber Security
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.
https://magrudy-assets.storage.googleapis.com/9781799822530.jpg
246.750000 USD

Quantum Cryptography and the Future of Cyber Security

Hardback
Book cover image
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through ...
Applied Incident Response
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network, including: Preparing your environment for effective incident response Leveraging MITRE ATT&CK and threat intelligence for active network defense Local and remote triage of systems using PowerShell, WMIC, and open-source tools Acquiring RAM and disk images locally and remotely Analyzing RAM with Volatility and Rekall Deep-dive forensic analysis of system drives using open-source or commercial tools Leveraging Security Onion and Elastic Stack for network security monitoring Techniques for log analysis and aggregating high-value logs Static and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox Detecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more Effective threat hunting techniques Adversary emulation with Atomic Red Team Improving preventive and detective controls
https://magrudy-assets.storage.googleapis.com/9781119560265.jpg
47.250000 USD

Applied Incident Response

by Steve Anson
Paperback / softback
Book cover image
This book explores recent advances in blockchain technology and its impact on Industry 4.0 via advanced technologies. It provides an in-depth analysis of the step by step evolution of Industry 4.0 and blockchain technologies for creating the next-generation, secure, decentralized, distributed and trusted industry environment and enhancing the productivity of ...
Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment
This book explores recent advances in blockchain technology and its impact on Industry 4.0 via advanced technologies. It provides an in-depth analysis of the step by step evolution of Industry 4.0 and blockchain technologies for creating the next-generation, secure, decentralized, distributed and trusted industry environment and enhancing the productivity of industries. The book describes how blockchain technology makes the industrial internet (Industry 4.0) a transparent, reliable and secure environment for people, processes, systems, and services, presenting a strong, technological and conceptual framework and roadmap for decision-makers involved in the transformation of any area of industry.
https://magrudy-assets.storage.googleapis.com/9789811511363.jpg
157.490000 USD

Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment

Hardback
Book cover image
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made ...
Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made significant impact since its initial publication in 1996. The authors show how the technique has been applied in many domains such as software reliability, distributed systems and OS development, etc. The book exemplifies how the algorithm has enhanced new real-time features by adding fault-tolerant capabilities for many applications. The authors posit that the Brooks-Iyengar Algorithm will to continue to be used where fault-tolerant solutions are needed in redundancy system scenarios.
https://magrudy-assets.storage.googleapis.com/9783030331313.jpg
135.450000 USD

Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm: Trends, Advances, and Future Prospects

by Kianoosh G. Boroojeni, M Hadi Amini, Pawel Sniatala
Hardback
Book cover image
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media what-not, etc. - are based on sophisticated mathematics and algorithms that in implementation are just a matter of computer arithmetic. And for speed it is necessary that the ...
Cryptography Arithmetic: Algorithms and Hardware Architectures
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media what-not, etc. - are based on sophisticated mathematics and algorithms that in implementation are just a matter of computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in hard applications of mathematics.
https://magrudy-assets.storage.googleapis.com/9783030341411.jpg
157.490000 USD

Cryptography Arithmetic: Algorithms and Hardware Architectures

by Amos R. Omondi
Hardback
Book cover image
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of ...
Handbook of Vascular Biometrics
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.
https://magrudy-assets.storage.googleapis.com/9783030277307.jpg
62.990000 USD

Handbook of Vascular Biometrics

Hardback
Book cover image
In today's technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT ...
Information Security Management Principles
In today's technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.
https://magrudy-assets.storage.googleapis.com/9781780175188.jpg
74.37 USD

Information Security Management Principles

by Andy Taylor, David Sutton, Amanda Finch, David Alexander
Paperback / softback
Book cover image
Collins Big Cat Phonics for Letters and Sounds features exciting fiction and non-fiction decodable readers to enthuse and inspire children. They are fully aligned to Letters and Sounds Phases 1-6 and contain notes in the back. The Handbooks provide support in demonstration and modelling, monitoring comprehension and expanding vocabulary. Aimee ...
Collins Big Cat Phonics for Letters and Sounds - Aimee and the Tablet: Band 2B/Red B
Collins Big Cat Phonics for Letters and Sounds features exciting fiction and non-fiction decodable readers to enthuse and inspire children. They are fully aligned to Letters and Sounds Phases 1-6 and contain notes in the back. The Handbooks provide support in demonstration and modelling, monitoring comprehension and expanding vocabulary. Aimee is keen to play a game on her mum's tablet, but will she know what to do when an error message appears? This sweet story, written by Childnet International, highlights internet safety to a young audience. Red B/Band 2B books offer simple but varied text with familiar objects and actions, combined with simple story development and a satisfying conclusion. The focus sounds in this book are: /ai/ /ee/ /igh/ /oa/ /oo/ /oo/ /ur/ /ow/ /ear/ /er/ Pages 14 and 15 allow children to re-visit the content of the book, supporting comprehension skills, vocabulary development and recall. Reading notes within the book provide practical support for reading Big Cat Phonics for Letters and Sounds with children, including a list of all the sounds and words that the book will cover.
https://magrudy-assets.storage.googleapis.com/9780008357672.jpg
7.91 USD

Collins Big Cat Phonics for Letters and Sounds - Aimee and the Tablet: Band 2B/Red B

by Childnet International, Tom Pinfield
Paperback / softback
Book cover image
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and grow a strong security operations team, including hiring the right people, ...
Security Operations in Practice: Building effective blue and red teams
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.
https://magrudy-assets.storage.googleapis.com/9781780175065.jpg
40.940000 USD

Security Operations in Practice: Building effective blue and red teams

by Mike Sheward
Paperback / softback
Book cover image
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and ...
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: Through the eyes of the author who has several years of experience in the subject. Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets. Through the eyes of industry leaders. This book is ideal for: Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data.
https://magrudy-assets.storage.googleapis.com/9781119540922.jpg
42.000000 USD

Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques

by Vinny Troia
Paperback / softback
Book cover image
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that ...
Risk and the Theory of Security Risk Assessment
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security risk assessment methodology. Furthermore, the book identifies and explores concepts with profound operational implications that have traditionally been sources of ambiguity if not confusion in security risk management. Notably, the text provides a simple quantitative model for complexity, a significant driver of risk that is typically not addressed in security-related contexts. Risk and The Theory of Security Risk Assessment is a primer of security risk assessment pedagogy, but it also provides methods and metrics to actually estimate the magnitude of security risk. Concepts are explained using numerous examples, which are at times both enlightening and entertaining. As a result, the book bridges a longstanding gap between theory and practice, and therefore will be a useful reference to students, academics and security practitioners.
https://magrudy-assets.storage.googleapis.com/9783030305994.jpg
125.990000 USD

Risk and the Theory of Security Risk Assessment

by Carl S Young
Hardback
Book cover image
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework ...
Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications
Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security, Second Edition has been updated to incorporate the changes in Spring Framework 5 and Spring Boot 2. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up. This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and Grails applications. What You Will Learn Explore the scope of security and how to use the Spring Security Framework Master Spring security architecture and design Secure the web tier in Spring Work with alternative authentication providers Take advantage of business objects and logic security Extend Spring security with other frameworks and languages Secure the service layer Who This Book Is ForExperienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applications.
https://magrudy-assets.storage.googleapis.com/9781484250518.jpg
41.990000 USD

Pro Spring Security: Securing Spring Framework 5 and Boot 2-based Java Applications

by Massimo Nardone, Carlo Scarioni
Paperback / softback
Book cover image
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27-28, 2019. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of ...
Fourth International Congress on Information and Communication Technology: ICICT 2019, London, Volume 1
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27-28, 2019. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of things (IoT), and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies.
https://magrudy-assets.storage.googleapis.com/9789811506369.jpg
314.990000 USD

Fourth International Congress on Information and Communication Technology: ICICT 2019, London, Volume 1

Paperback / softback
Book cover image
Learn how to design, develop, and deploy smart contracts on the Ethereum blockchain. With this practical book, software developers with a high-level understanding of the blockchain will use the Solidity programming language to write decentralized applications (dApps) using the web3.js library. Smart contracts have allowed technologists to create a new ...
Hands-On Smart Contract Development with Solidity and Ethereum: From Fundamentals to Deployment
Learn how to design, develop, and deploy smart contracts on the Ethereum blockchain. With this practical book, software developers with a high-level understanding of the blockchain will use the Solidity programming language to write decentralized applications (dApps) using the web3.js library. Smart contracts have allowed technologists to create a new breed of software systems that have ushered in the next revolution in human organization. Kevin Solorio, Randall Kanna, and David Hoover teach you the fundamentals of Solidity, as well as key topics such as unit testing, deployment, and preventing security vulnerabilities. You'll also learn how to leverage the built-in public/private key cryptography in the Ethereum protocol. Learn the fundamentals of how the Ethereum blockchain works Setup a local Ethereum client using Parity Develop and test secure smart contracts using Solidity and Vyper Learn how to deploy smart contracts Interact with your smart contract using Web3 (JavaScript) Work with hands-on examples and walkthroughs of common scenarios
https://magrudy-assets.storage.googleapis.com/9781492045267.jpg
89.25 USD

Hands-On Smart Contract Development with Solidity and Ethereum: From Fundamentals to Deployment

by David H Hoover, Randall Kanna, Kevin Solorio
Paperback / softback
Book cover image
Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, ...
Impact of Digital Transformation on Security Policies and Standards
Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.
https://magrudy-assets.storage.googleapis.com/9781799823674.jpg
225.750000 USD

Impact of Digital Transformation on Security Policies and Standards

Hardback
Book cover image
Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy ...
Cryptography: Breakthroughs in Research and Practice
Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.
https://magrudy-assets.storage.googleapis.com/9781799817635.jpg
383.250000 USD

Cryptography: Breakthroughs in Research and Practice

Hardback
Page 1 of 40