-
Author Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily ....
Release Date 2020/06 -
Visual Media Coding and Transmission
Author Ahmet Kondoz
This book presents the state-of-the-art in visual media coding and transmissionVisual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields ....
Release Date 2010/04 -
Tools for Signal Compression: Applications to Speech and Audio Coding
Author Nicolas Moreau
This book presents tools and algorithms required to compress/uncompress signals such as speech and music. These algorithms are largely used in mobile phones, DVD players, HDTV sets, etc.In a first rather theoretical part, this book presents the standard tools used i....
Release Date 2011/05 -
The Oliver Wight Class A Standard for Business Excellence, 7th Edition
Author Oliver Wight International , Inc.
The Oliver Wight Class A Standard for Business Excellence is the definitive, comprehensive statement of excellence in business today. Oliver Wight’s Class A Standard is the accumulated practice and experience of Oliver Wight Consultants around the world. It reflect....
Release Date 2017/05 -
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver Meiert
A proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12 -
The Complete Coding Interview Guide in Java
Author Anghel Leonard
Explore a wide variety of popular interview questions and learn various techniques for breaking down tricky bits of code and algorithms into manageable chunksKey FeaturesDiscover over 200 coding interview problems and their solutions to help you secure a job as a Java dev....
Release Date 2020/08 -
The CERT® Oracle® Secure Coding Standard for Java™
Author David Svoboda , Dean F. Sutherland , Robert C. Seacord , Dhruv Mohindra , Fred Long
“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A....
Release Date 2011/09 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
Sourcing to Support the Green Initiative
Author Lisa Ellram , Wendy Tate
The “green” or environmental sustainability movement has taken hold throughout the world. Its staying power is confirmed by that fact that environmental emphasis in organizations did not decrease during the recent global recession, but rather increased. However, sin....
Release Date 2013/07 -
Shared Memory Application Programming
Author Victor Alessandrini
Shared Memory Application Programming presents the key concepts and applications of parallel programming, in an accessible and engaging style applicable to developers across many domains. Multithreaded programming is today a core technology, at the basis of all sof....
Release Date 2015/11 -
Author Allan Liska , Stephen Gates
Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company’s vulnerabilities to common web application security th....
Release Date 2018/07 -
Author Chetan Karande
Security incidents are indeed on the rise, but according to one authoritative analysis, 85% of all successful exploits focus on the top ten security vulnerabilities. In this report, author Chetan Karande—an active member of the Open Web Application Security Project....
Release Date 2017/05 -
Secure Programming Cookbook for C and C++
Author Matt Messier , John Viega
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly,....
Release Date 2003/07 -
Secure Coding: Principles and Practices
Author Kenneth R. van Wyk , Mark G. Graff
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and ....
Release Date 2003/06 -
Secure Coding in C and C++, Second Edition
Author Robert C. Seacord
Learn the Root Causes of Software Vulnerabilities and How to Avoid ThemCommonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a rel....
Release Date 2013/04 -
Author Robert C. Seacord
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specif....
Release Date 2005/09 -
Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
Release Date 2019/09 -
Author Peter Senge , Don Frick
Meet the man whose work influenced some of the world's most prominent business leaders and spawned a worldwide movement that is still gaining strength today. Robert Greenleaf's landmark 1970 essay, The Servant as Leader, introduced the now common term “servan....
Release Date 2004/06 -
Author Roman Zabicki
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
Release Date 2019/02 -
Practical Linux Security Cookbook - Second Edition
Author Tajinder Kalsi
Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use v....
Release Date 2018/08 -
Passwords & Internet Addresses Journal For Dummies
Author Ryan C. Williams
Keep track of your passwords and learn how to make them betterYou have dozens of passwords for dozens of uses, and it seems every account has different password requirements. How can you keep them all straight while keeping them secure? This ingenious little book so....
Release Date 2013/11 -
Optical Coding Theory with Prime
Author Guu-Chang Yang , Wing C. Kwong
Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory—until now. Written by renowned authorities in the field, O....
Release Date 2013/05 -
Next-Generation Video Coding and Streaming
Author Benny Bing
Reviews the new High Efficiency Video Coding (HEVC) standard and advancements in adaptive streaming technologies for use in broadband networks and the InternetThis book describes next-generation video coding and streaming technologies with a comparative assessment ....
Release Date 2015/10 -
Author William Puech
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveilla....
Release Date 2022/07 -
Author Aalseth
In clear and straightforward language, Medical Coding: What It Is and How It Works, Second Edition provides an overview of the evolution of medical coding and all the various coding systems, how they relate, and how they function. Reasoning and consequences of the d....
Release Date 2014/08 -
Interpretation and Application of IPSAS
Author Isabelle Andernack , Caroline Aggestam-Pontoppidan
Clear, practical IPSAS guidance, explanation, and examplesInterpretation and Application of IPSAS provides practical guidance on the implementation and application of the International Public Sector Accounting Standards. This book brings readers up to date on the s....
Release Date 2016/02 -
Internet and Web Application Security, 3rd Edition
Author Mike Harwood , Ron Price
Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry experts, this book provides a comprehensive explanati....
Release Date 2022/11 -
Information Theory, Coding and Cryptography
Author Mandal , Nilotpal Manna , Arijit Saha
Information Theory, Coding & Cryptography has been designed as a comprehensive text for the students of engineering discussing Source Encoding, Error Control Codes & Cryptography. The book contains the recent developments of coded modulation, trellises for ....
Release Date 2013/05 -
Author Robert G. Werner , James A. Bach
The H-1B visa is the gateway for the world's best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. How to Secure Your H-1B Visa guides employees and employers alike through....
Release Date 2013/01