-
Information Theory, Coding and Cryptography
Author Mandal , Nilotpal Manna , Arijit Saha
Information Theory, Coding & Cryptography has been designed as a comprehensive text for the students of engineering discussing Source Encoding, Error Control Codes & Cryptography. The book contains the recent developments of coded modulation, trellises for ....
Release Date 2013/05 -
Author William Puech
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveilla....
Release Date 2022/07 -
Alice and Bob Learn Application Security
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development.... -
Error Control Coding For B3G/4G Wireless Systems: Paving the Way to IMT-Advanced Standards
Author Dr. Moshe Ran , Dr. Thierry Lestable
Covering the fast evolving area of advanced coding, Error Control Coding for B3G/4G Wireless Systems targets IMT-Advanced systems to present the latest findings and implementation solutions. The book begins by detailing the fundamentals of advanced coding techniques....
Release Date 2011/06 -
Author Eric J Gruber
Like to build websites in the wild with your MacBook? This concise hands-on guide introduces you to the ideal editor: Coda 2. Rather than clutter your screen with shell access, a separate CSS editor, and a version control app, you’ll discover how Coda’s "one-window ....
Release Date 2013/01 -
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver Meiert
A proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12 -
Coding Interviews: Questions, Analysis & Solutions
Author Harry He
This book is about coding interview question of software and Internet companies. It covers five key factors which determine performance of candidates: (1) the basics of programming languages, data structures and algorithms, (2) approaches to writing code with high q....
Release Date 2012/12 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
Passwords & Internet Addresses Journal For Dummies
Author Ryan C. Williams
Keep track of your passwords and learn how to make them betterYou have dozens of passwords for dozens of uses, and it seems every account has different password requirements. How can you keep them all straight while keeping them secure? This ingenious little book so....
Release Date 2013/11 -
Author Robert C. Seacord
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specif....
Release Date 2005/09 -
Author Chetan Karande
Security incidents are indeed on the rise, but according to one authoritative analysis, 85% of all successful exploits focus on the top ten security vulnerabilities. In this report, author Chetan Karande—an active member of the Open Web Application Security Project....
Release Date 2017/05 -
Author Allan Liska , Stephen Gates
Most enterprise applications today live on the network edge, right where attackers are focusing increasing attention and activities to gain access to your data. This practical report helps analyze your company’s vulnerabilities to common web application security th....
Release Date 2018/07 -
Tools for Signal Compression: Applications to Speech and Audio Coding
Author Nicolas Moreau
This book presents tools and algorithms required to compress/uncompress signals such as speech and music. These algorithms are largely used in mobile phones, DVD players, HDTV sets, etc.In a first rather theoretical part, this book presents the standard tools used i....
Release Date 2011/05 -
Shared Memory Application Programming
Author Victor Alessandrini
Shared Memory Application Programming presents the key concepts and applications of parallel programming, in an accessible and engaging style applicable to developers across many domains. Multithreaded programming is today a core technology, at the basis of all sof....
Release Date 2015/11 -
Secure Coding in C and C++, Second Edition
Author Robert C. Seacord
Learn the Root Causes of Software Vulnerabilities and How to Avoid ThemCommonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a rel....
Release Date 2013/04 -
Optical Coding Theory with Prime
Author Guu-Chang Yang , Wing C. Kwong
Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory—until now. Written by renowned authorities in the field, O....
Release Date 2013/05 -
Author Nikhil Abraham
See all the things coding can accomplishThe demand for people with coding know-how exceeds the number of people who understand the languages that power technology. Coding All-in-One For Dummies gives you an ideal place to start when you're ready to add this valuab....
Release Date 2017/05 -
Secure Programming Cookbook for C and C++
Author Matt Messier , John Viega
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly,....
Release Date 2003/07 -
The CERT® Oracle® Secure Coding Standard for Java™
Author David Svoboda , Dean F. Sutherland , Robert C. Seacord , Dhruv Mohindra , Fred Long
“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A....
Release Date 2011/09 -
Designing and Developing Secure Azure Solutions
Author Michael Howard , Simone Curzi , Heinrich Gantenbein
Plan, build, and maintain highly secure Azure applications and workloadsAs business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across t....
Release Date 2022/11 -
Author Laura Bell , Jim Bird , Rich Smith , Michael Brunton-Spall
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understandin....
Release Date 2017/09 -
Author Peter Senge , Don Frick
Meet the man whose work influenced some of the world's most prominent business leaders and spawned a worldwide movement that is still gaining strength today. Robert Greenleaf's landmark 1970 essay, The Servant as Leader, introduced the now common term “servan....
Release Date 2004/06 -
Practical Linux Security Cookbook - Second Edition
Author Tajinder Kalsi
Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use v....
Release Date 2018/08 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
Author Sunny Wear
Get hands-on experience in using Burp Suite to execute attacks and perform web assessmentsKey FeaturesExplore the tools in Burp Suite to meet your web infrastructure security demands Configure Burp to fine-tune the suite of tools specific to the target Use Burp ext....
Release Date 2018/09 -
Cracking Security Misconceptions
Author Andrew Peterson
As stories continue to mount about security breaches in organizations and government agencies—such as the 2016 US Department of Justice hack—many people believe there’s really nothing they can do about it. Fact is, you can do quite a bit. In this report, security p....
Release Date 2016/09 -
Author Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily ....
Release Date 2020/06 -
Secure Coding: Principles and Practices
Author Kenneth R. van Wyk , Mark G. Graff
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and ....
Release Date 2003/06 -
Author Roman Zabicki
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
Release Date 2019/02 -
Building Secure Software: How to Avoid Security Problems the Right Way
Author Gary McGraw , John Viega
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all....
Release Date 2001/09