The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has...
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked...
This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them Based on real-world situations taken...
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and...
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the...
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title...
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they...
Thanks to the Internet, it has never been so easy to become the person of your wildest dreams. Immersive 3D worlds such as Second Life and THERE.com provide an escape route from the ordinary, into a virtual world where you have the power to...
First title to ever present soft computing approaches and their application in data mining, along with the traditional hard-computing approaches Addresses the principles of multimedia data compression techniques (for image, video, text) and...
Software Paradigms provides the first complete compilation of software paradigms commonly used to develop large software applications, with coverage ranging from discrete problems to full-scale applications. The book focuses on providing a...
Become a Google guru with these effective tips, tricks, and techniques Sure, you use Google. But do you really use Google—and everything it has to offer—in the most effective way possible? Wish you could just sit down with a Google expert who...
Practical data design tips from a data visualization expert of the modern age Data doesn?t decrease; it is ever-increasing and can be overwhelming to organize in a way that makes sense to its intended audience. Wouldn?t it be wonderful if we...
The A-to-Z guide to spotting and fixing usability problems Frustrated by pop-ups? Forms that make you start over if you miss a field? Nonsensical error messages? You're not alone! This book helps you simply get it right the first time (or fix...
New owner of a Droid? Enjoy it even more with this perfect guide Congratulations on owning one of the hottest smartphones on the planet—more than 400,000 new Android phones are activated every day! Now get the very most out your new Droid with...
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle...
A review of the interdisciplinary field of synthetic biology, from genome design to spatial engineering Written by an international panel of experts, Synthetic Biology draws from various areas of research in biology and engineering and explores...
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives....
Examines how risk management security technologies must prevent virus and computer attacks, as well as providing insurance and processes for natural disasters such as fire, floods, tsunamis, terrorist attacks Addresses four main topics: the risk...
A Step-by-Step Guide to Verification of Digital Systems This practical book provides a step-by-step, interactive introduction to formal verification of systems and circuits. The book offers theoretical background and introduces the application...
This is the first book to explain the language Unified Parallel C and its use. Authors El-Ghazawi, Carlson, and Sterling are among the developers of UPC, with close links with the industrial members of the UPC consortium. Their text covers...
This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project...
A unified view of metaheuristics This book provides a complete background on metaheuristics and shows readers how to design and implement efficient algorithms to solve complex optimization problems across a diverse range of applications, from...
Develop the skills you need to design and build a reliable, cost-effective cabling infrastructure Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is...
In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine...
Die Bioinformatik ist fur die Weiterentwicklung der modernen Biowissenschaften von herausragender Bedeutung. In Grundzugen wird sie Teil einer jeden Ausbildung zum Biologen oder Biochemiker werden. Obwohl die Zahl der angebotenen...
Leading authorities deliver the commandments for designing high-speed networks There are no end of books touting the virtues of one or another high-speed networking technology, but until now, there were none offering networking professionals a...
The first how-to guide for online storage management with Windows 2000 In this book, expert Paul Massiglia first provides a clear tutorial on the principles of managed online storage and then walks you through the basics of how to manage your...
To be competitive, service providers cannot customize every installation but must simultaneously offer services that meet a wide range of perceived customer needs. This guide shows commercial service providers and equipment vendors how to build...
Clustering is a vital methodology in the data storage world. Its goal is to maximize cost-effectiveness, availability, flexibility, and scalability. Clustering has changed considerably for the better due to Storage Area Networks, which provide...
The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine...
The current Symbian Press list focuses very much on the small scale features of Symbian OS in a programming context. The Architecture Sourcebook is different. It's not a how-to book, it's a 'what and why' book. And because it names names as it...
Help for grown-ups new to coding Getting a jump on learning how coding makes technology work is essential to prepare kids for the future. Unfortunately, many parents, teachers, and mentors didn't learn the unique logic and language of coding in...
Go beyond technique to master the difficult judgement calls of forecasting A variety of software can be used effectively to achieve accurate forecasting, but no software can replace the essential human component. You may be new to forecasting,...
Become a machine learning pro! Google TensorFlow has become the darling of financial firms and research organizations, but the technology can be intimidating and the learning curve is steep. Luckily, TensorFlow For Dummies is here to offer you a...
A practical overview of OMA specifications and how they enable mobile multimedia services & much more …! The Open Mobile Alliance (OMA) is an industry forum, which develops open specifications to help in the creation of applications and services...
An unparalleled opportunity to learn about an exciting new technology that is revolutionizing network and Internet content delivery Network Query Language (NQL) is a revolutionary new scripting language that makes it astonishingly quick and easy...
A practical, real-world introduction to AWS tools and concepts Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and...
This book covers various modern theoretical, technical, practical and technological aspects of computerized numerical control and control systems of deterministic and stochastic dynamical processes.
Metaheuristic Algorithms in Maritime Operations Optimization focuses on the seaside and port side problems regarding the maritime transportation. The book reviews and introduces the most important problems regarding the shipping network design,...
Increase the value of your organization’s cloud network—and invest in your education The Cisco Cloud certification validates the skill set of individuals on industry-leading cloud solutions and best practices, as well as offering job role-based...
A smarter, faster review for the CompTIA Network+ exam N10-007 Expertly authored questions provide comprehensive, concise review of 100% of all CompTIA Network+ exam objectives. This certification validates skills equivalent to nine months of...
An easy-to-understand primer on Virtual Reality and Augmented Reality Virtual Reality (VR) and Augmented Reality (AR) are driving the next technological revolution. If you want to get in on the action, this book helps you understand what these...
The central thesis of The Web's Awake is that the phenomenal growth and complexity of the web is beginning to outstrip our capability to control it directly. Many have worked on the concept of emergent properties within highly complex systems,...
Stay ahead of the web evolution with elegant combination front-end development Front-End Development with ASP.NET Core, Angular, and Bootstrap is the professional's guide to fast, responsive web development. Utilizing the most popular...
Create more powerful, flexible applications using a new extension of the XML standard Programmers are finding that the XMI extension of the XML standard provides a lot more flexibility in writing software for sharing data. Written by one of the...
Get the most out of your iPhone X Apple's iPhone X represents such a radical departure from all previous models of the globally known iPhone that it needs its own book to help users navigate the new features. Luckily, iPhone X For Dummies is...
Make the most of R’s extensive toolset R Projects For Dummies offers a unique learn-by-doing approach. You will increase the depth and breadth of your R skillset by completing a wide variety of projects. By using R’s graphics, interactive, and...
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the...
The essential roadmaps for enterprise cloud adoption As cloud technologies continue to challenge the fundamental understanding of how businesses work, smart companies are moving quickly to adapt to a changing set of rules. Adopting the cloud...
Эта книга в доступной форме рассказывает об администрировании сетей с применением оборудования Cisco. С помощью практических заданий вы сможете за месяц получить полное представление о том, как работают сети, и получите знания, которые сможете...