Welcome, and thank you for taking a look at this book! Unlike the vast array of networking books written by geeks for geeks, this book was written for you and for anyone who wants to understand the computer networking phenomenon that has taken the world by storm. (In other words, it’s by geeks for nongeeks.) We understand that the vast majority of people working in this industry are not n…
The number of internet users has increased dramatically during the last few decades. The improvement in internet speed and the drop in the price of using it has contributed to this expansion. With the advent of the internet, billions of individuals are now able to go online. The growth of the internet has given rise to a number of new industries, like social media and online financial services,…
Cloud computing and big data are two emerging paradigms in the recent developments of information technology. The big data paradigm is applied to complex data and to the dataset whose size is beyond the competency of traditional computing services. Due to the innovation of big data, this technology is exposed to vulnerabilities, new risks, and threats due to a substantial volume of data and als…
Network administrators of all backgrounds share one underlying, overwhelming desire. It doesn’t matter if you manage a network with 400 separate manufacturing plants connected by a global MPLS mesh or if you’re responsible for three computers and an elderly printer. Network administrators all share an abiding and passionate desire for just one thing: We want our users to shut up.
This book uses Drupal, a powerful and extendable Content Management System (CMS), to set up and manage a social networking web site using a range of powerful and feature-rich social networking modules that are available. By using Drupal, the site can be built and extended rapidly, and changed easily, as the social network evolves and grows.
This book is a complete discussion of state-of-the-art technology used in identification, acquisition, and forensic analysis of mobile devices with the iOS operating system, and it has been extended and updated to iOS 8 and 9. It is a practical guide that will help investigators understand how to manage scenarios efficiently during their daily work on this type of mobile device. The need for a …
Most people don’t need much convincing to use Excel, Microsoft’s premier spreadsheet software. Its overwhelming popularity, especially in the business world, makes it the obvious choice for millions of number crunchers. But despite its wide use, few people know where to find Excel’s most impressive features or why they’d want to use them in the first place. Excel 2010: The Missing Manua…
In the early 1990s, I could not find a textbook from which to teach an Issues in Environmental Pollution course. So began the writing of class notes, added to by student concerns, misunderstandings, questions, and an ever-increasing volume of information on the issues. The result was the text, Understanding Environmental Pollution. It summarizes the basics of many pollution issues, using langua…
This book is about computer programming. Programming is a way of conceiving and embracing the unknown. At its best, programming goes beyond developing commercial applications. It becomes a way of exploring and mapping other ways of thinking. It is the means by which one can simulate, extend, and experiment with principles, rules, and methods of traditionally humandefined theories. In developing…
This book is a part of the comprehensive series Current Developments in Biotechnology and Bioengineering (Editor-in-Chief: Ashok Pandey), comprising nine volumes, and presents a collection of chapters dealing with solid waste management. According to a World Health Organization report, world cities alone currently generate about 1.3 billion tonnes of solid waste per year, and this figure is pre…
Fifteen years ago, the average computer user spent most of his or her time using productivity applications such as Microsoft® Word or Microsoft Excel®. In the ensuing years, users have become more sophisticated, network implementations have become the rule rather than the exception, and collaboration has become a key facet of a successful business strategy. Perhaps the most signifi cant chang…
Cyber security is a topic that cuts across pretty much every area of life. Government, healthcare, politics, fashion, sports, the media, big business, small business, charities, education – you name it, it is affected by cyber security. It is a fascinating, challenging, fast-paced field that changes every day, but at the same time is concerned with issues that have been a part of human life f…
This book will inform about computer organization
The world of cybersecurity happens to be very dynamic. As technology progresses, the field witnesses novel innovations in the forms of offensive tools and defensive mechanisms that make it a constant battleground, where the fight between red teams and blue teams ensues habitually and often on a large scale. As a cybersecurity researcher, I have always been intrigued by what is allowed and what …
This textbook focuses on: (i) the continuum of the environment— namely the earth, water, and atmosphere, epitomized by the term “Environmental Science”; and (ii) science-based aspects of the pollution of the environment. Thus, this textbook is designed to provide a scientific basis that will allow for prudent decisions to be made to manage and mitigate pollution throughout the environment…
Risk is a part of everyday life, and even quite straightforward businesses can have a range of ‘hazards’. You are not expected to eliminate all risk. What you must do is make sure you know about the main risks that affect you, and what you need to do to manage them responsibly.
Designing a software system is difficult. Understanding the context in which a software system lives is more difficult. In order to understand that context, developers need to communicate with the business. But there is a lot that can go wrong while communicating with the business. For example people can misunderstand what is being said, they are scared to speak up, tensions could grow, and con…
Today’s researchers estimate that application programming interface (API) calls make up more than 80 percent of all web traffic. Yet despite their prevalence, web application hackers often fail to test them. And these vital business assets can be riddled with catastrophic weaknesses. As you’ll see in this book, APIs are an excellent attack vector. After all, they’re designed to expose in…
A secure development lifecycle (SDL) consists of activities that strengthenan application or product’s security posture during the software development lifecycle (SDLC). This can also be known as a secure software development lifecycle (SSDL, SSDLC, S-SDLC) or Secure Software Development Framework (SSDF). However you call it, its main goal is to augment an SDLC such as waterfall, Agile (e.g.,…
Large-scale video networks are becoming increasingly important for a wide range of critical applications such as video surveillance, the monitoring of disaster zones and traffic, elderly care, the tracking of people and vehicles in crowded environments, and the acquisition of more realistic images for consumer electronics and entertainment. In most of these applications, multiple sensors such a…
Financial Products provides a step-by-step guide to some of the most important ideas underpinning financial mathematics. It describes and explains interest rates, discounting, arbitrage, risk neutral probabilities, forward contracts, futures, bonds, FRA and swaps. It shows howto construct both elementary and more complex (Libor) zero curves. Options are described, illustrated and then priced us…
The field of Distributed Computing covers “all aspects of computing and information access across multiple processing elements connected by any form of communication networks, whether local or wide-area in the coverage”. Since the advent of the Internet in the 1970s, there has been a steady growth of new applications requiring distributed processing. This was enabled by advances in networki…
As cybersecurity threats keep growing exponentially in scale, frequency, and impact, legacy-based threat detection systems have proven inadequate. This has prompted the use of machine learning (hereafter, ML) to help address the problem. But as organizations increasingly use intelligent cybersecurity techniques, the overall efficacy and benefit analysis of these ML-based digital security system…
Optimization is a subject that is widely and increasingly used in science, engineering, economics, management, industry, and other areas. It deals with selecting the best of many possible decisions in real-life environment, constructing computational methods to find optimal solutions, exploring the theoretical properties, and studying the computational performance of numerical algorithms implem…
Global cyberspace is made of complex, multi-layered information networks which encompass the communication networks of the public sector, business community, security authorities and control and monitoring systems used by industry and critical infrastructure which, by means of the Internet, create a worldwide network. Imaginative data processing and utilization, arising from the needs of citize…
The need for more and more bandwidth forces us to think of more granularity. The best promising solution is to use Wavelength Division Multiplexing (WDM) all-optical networks in core networks. Note that an optical network that uses optical transmission and keeps optical data paths through the nodes from source to destination is called all-optical network.
The subjects and disciplines of chemistry and chemical engineering have encountered a new landmark in the way of thinking about, developing, and designing chemical products and processes. This revolutionary philosophy, termed green chemistry and chemical engineering, focuses on the designs of products and processes that are conducive to reducing or eliminating the use and generation of hazardou…
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either a Catalyst 6500 series chassis or a 7600 series router chassis. The “tight” integration with a chassis offers increased flexibility, especially with network virtualization and the incredible throughput that is no…
Times have changed. Computer programming has become much easier, and even so-called normal people now engage in this activity — and even admit it to friends and family. Programming simply means developing instructions that the computer automatically carries out. Excel programming refers to the fact that you can instruct Excel to automatically do things that you normally do manually — saving…
This book will inform about Environmental and health risk assessment and management
The soil environment is a major sink for a multitude of chemicals and heavy metals, which inevitably leads to environmental contamination problems. Indeed, a plethora of different types of heavy metals are used and emanated through various human activities including agricultural, urban or industrial. Millions of tonnes of trace elements are produced every year from mines in demand for newer mat…
The atmosphere’s dynamics have a direct effect on weather conditions and consequently on the climate and human existence. Emissions of air pollutants affect the public health, the ecosystem and result in climatic changes. The first chapter examines in depth the meteorology and the dynamics of the atmosphere. It examines the atmospheric structure, the chemical composition of the atmosphere and…
The advances in sensor design have decreased the size, weight, and cost of sensors by orders of magnitude, yet with the increase of higher spatial and temporal resolution and accuracy. With the fast progress of sensors design and communications technique, sensor networks have also been quickly evolving in both research and practical domains in the last decade. More and more sensor networks have…
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, the certified employee/consultant/job candidate is considered more valuable than one who is not.
Deep learning (also known as deep structured learning) is part of a broader family of machine learning methods based on artificial neural networks with representation learning. Learning can be supervised, semi-supervised or unsupervised. Deep-learning architectures such as deep neural networks, deep belief networks, deep reinforcement learning, recurrent neural networks and convolutional neural…
Big Data has attracted much attention. Many examples are given in the news how new data-driven applications and algorithms provide new insights, enable more effective and efficient operation, and support experts in a wide variety of application domains. This suggests that getting value out of data is easy, but practitioners in the field know better. Obtaining novel, actionable insights from la…
Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber threats, there is both an imperative need and opportunity to grow a new generation of young researchers trained to handle the changing nature of the upcoming cyber security challenges.
Internet of Things (IoT) has become a prominent part of the technologies leveraged by smart cities. IoT enables the collection of data and the processing of information to provide a better value to the city and its citizens. The use of IoT devices in smart cities has enabled many applications that generate security issues despite their provided benefits.
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year. Other anti-virus vendors, including F-Secure, forecast an increase in att…
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed formalicious and illegal purposes have grown substantially. The most current Symantec Internet Security Threat Report announced that over 403 million new threats emerged in 2011. Other antivirus vendors, including F-Secure, document a recent increase in…