-
Fixing an Insecure Software Life Cycle
Author April C. Wright
In the race to remain competitive, development teams in many companies are under tremendous pressure to create software on tight deadlines. And in most cases, that means dealing with security bugs only after software is released. But offensive testing and incident ....
Release Date 2018/05 -
Author Michael Collins
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company’s network. In many organizations, security analysts initiate threat hunting when they spot something weird—network conditions or activ....
Release Date 2018/05 -
Environment Modeling-Based Requirements Engineering for Software Intensive Systems
Author Zhi Jin
Environment Modeling-Based Requirements Engineering for Software Intensive Systems provides a new and promising approach for engineering the requirements of software-intensive systems, presenting a systematic, promising approach to identifying, clarifying, modeling....
Release Date 2018/04 -
Author Toomas Viira
"I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I also enjoyed the author’s style and his technical expertise shone through," Christopher Wright, Wright CandA Consulting Ltd. Protecting critical information infra....
Release Date 2018/01 -
Visual Cryptography and Secret Image Sharing
Author Ching-Nung Yang , Stelvio Cimato
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography ....
Release Date 2017/12 -
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Author Jean-Philippe Aumasson
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, bl....
Release Date 2017/11 -
Security from First Principles
Author Susan Sons , Craig Jackson , Scott Russell
Today, a spate of best practices guides, checklists, policies, and standards pervade nearly every part of information security practice. Some are well thought out and well written, others less so. How do you evaluate them? This report explores the Information Secur....
Release Date 2017/10 -
Author Amanda Berlin , Lee Brotherston
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to ....
Release Date 2017/04 -
Author Leslie S. Hiraoka
He covers the anti-trust case against Microsoft; the successes of eBay, Amazon, Yahoo, and Google; road-kills along the information highway such as the forgotten eToys; as well as the Enron implosion and other corporate scandals. After tracing this amazing story he....
Release Date 2017/03 -
Cyber Security Engineering: A Practical Approach for Systems and Software Assurance
Author Carol C. Woody , Nancy R. Mead
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensi....
Release Date 2016/10 -
Particle Technology and Engineering
Author Chuan-Yu Wu , Jonathan P.K. Seville
Particle Technology and Engineering presents the basic knowledge and fundamental concepts that are needed by engineers dealing with particles and powders. The book provides a comprehensive reference and introduction to the topic, ranging from single particle charac....
Release Date 2016/05 -
Author Ulrich Hertrampf , Gerhard Rosenberger , Manfred Kufleitner , Volker Diekert
The idea behind this book is to provide the mathematical foundations for assessing modern developments in the Information Age. It deepens and complements the basic concepts, but it also considers instructive and more advanced topics. The treatise starts with a gene....
Release Date 2016/05 -
Developing the Next Generation of Enterprise Leaders
Author M. Ellen Peebles , Douglas Ready
A survey of top business executives from major international organizations found that 79% said it was extremely important to have leaders who act on behalf of the entire organization, not just their units. The rest said it was very important. Nearly 65% said they e....
Release Date 2015/10 -
Modern Cryptography: Applied Mathematics for Encryption and Information Security
Author Chuck Easttom
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise requiredCryptography underpins today’s cyber-security; however, few information security professionals....
Release Date 2015/10 -
Enterprise Security Architecture
Author Nicholas A Sherwood
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a fr....
Release Date 2015/09 -
Freedom to Change: Four Strategies to Put Your Inner Drive into Overdrive
Author Michael Fullan
Break free to make real change for yourself and othersHave you ever felt like your progress was being blocked, not just by your own circumstances, but by the presence and actions of others? Freedom to Change releases you from the trap of constantly telling yourself....
Release Date 2015/06 -
Author Bruce Wimmer , CPP
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and....
Release Date 2015/03 -
Author Babak Akhgar , Colin Pattinson , Mohammad Dastbaz
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates t....
Release Date 2015/03 -
Data Protection and the Cloud: Are the risks too great?
Author Paul Ticher
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to ....
Release Date 2015/02 -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Cathodic Corrosion Protection Systems
Author Alireza Bahadori
Corrosion is a naturally occurring cost, worth billions in the oil and gas sector. New regulations, stiffer penalties for non-compliance and aging assets are all leading companies to develop new technology, procedures and bigger budgets catering to one prevailing me....
Release Date 2014/07 -
The Scientification of Religion
Author Kocku von Stuckrad
The enigmatic relation between religion and science still presents a challenge to European societies and to ideas about what it means to be ‘modern.’ This book argues that European secularism, rather than pushing back religious truth claims, in fact has been religi....
Release Date 2014/05 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
Author Paul Groth , Luc Moreau
The World Wide Web is now deeply intertwined with our lives, and has become a catalyst for a data deluge, making vast amounts of data available online, at a click of a button. With Web 2.0, users are no longer passive consumers, but active publishers and curators of....
Release Date 2013/09 -
Resource-Oriented Architecture Patterns for Webs of Data
Author Brian Sletten
The surge of interest in the REpresentational State Transfer (REST) architectural style, the Semantic Web, and Linked Data has resulted in the development of innovative, flexible, and powerful systems that embrace one or more of these compatible technologies. Howeve....
Release Date 2013/04 -
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud
Author Lee Newcombe
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud Every Cloud should have a secure lining Cloud Computing represents a major change to the IT services landscape. Cloud services, such as SalesForce, Amazon Web Services® and Microsoft....
Release Date 2012/07 -
Author Mark D. Wolfinger
In an era where “buy and hold” investment strategies no longer work, investors desperately need portfolio protection. Fortunately, it’s available—in the form of options. In Why Trade Options? top trader and options instructor Mark D. Wolfinger shows how options can ....
Release Date 2012/01 -
Express Learning: Cryptography and Network Security
Author ITL Education Solutions Limited
Express Learning is a series of books designed as quick reference guides to important undergraduate computer courses. The organized and accessible format of these books allows students to learn important concepts in an easy-to-understand, question-and-answer format.....
Release Date 2012/01