Fifteen years ago, the average computer user spent most of his or her time using productivity applications such as Microsoft® Word or Microsoft Excel®. In the ensuing years, users have become more sophisticated, network implementations have become the rule rather than the exception, and collaboration has become a key facet of a successful business strategy. Perhaps the most signifi cant chang…
Cyber security is a topic that cuts across pretty much every area of life. Government, healthcare, politics, fashion, sports, the media, big business, small business, charities, education – you name it, it is affected by cyber security. It is a fascinating, challenging, fast-paced field that changes every day, but at the same time is concerned with issues that have been a part of human life f…
This book will inform about computer organization
The world of cybersecurity happens to be very dynamic. As technology progresses, the field witnesses novel innovations in the forms of offensive tools and defensive mechanisms that make it a constant battleground, where the fight between red teams and blue teams ensues habitually and often on a large scale. As a cybersecurity researcher, I have always been intrigued by what is allowed and what …
This textbook focuses on: (i) the continuum of the environment— namely the earth, water, and atmosphere, epitomized by the term “Environmental Science”; and (ii) science-based aspects of the pollution of the environment. Thus, this textbook is designed to provide a scientific basis that will allow for prudent decisions to be made to manage and mitigate pollution throughout the environment…
Risk is a part of everyday life, and even quite straightforward businesses can have a range of ‘hazards’. You are not expected to eliminate all risk. What you must do is make sure you know about the main risks that affect you, and what you need to do to manage them responsibly.
Designing a software system is difficult. Understanding the context in which a software system lives is more difficult. In order to understand that context, developers need to communicate with the business. But there is a lot that can go wrong while communicating with the business. For example people can misunderstand what is being said, they are scared to speak up, tensions could grow, and con…
Today’s researchers estimate that application programming interface (API) calls make up more than 80 percent of all web traffic. Yet despite their prevalence, web application hackers often fail to test them. And these vital business assets can be riddled with catastrophic weaknesses. As you’ll see in this book, APIs are an excellent attack vector. After all, they’re designed to expose in…
A secure development lifecycle (SDL) consists of activities that strengthenan application or product’s security posture during the software development lifecycle (SDLC). This can also be known as a secure software development lifecycle (SSDL, SSDLC, S-SDLC) or Secure Software Development Framework (SSDF). However you call it, its main goal is to augment an SDLC such as waterfall, Agile (e.g.,…
Large-scale video networks are becoming increasingly important for a wide range of critical applications such as video surveillance, the monitoring of disaster zones and traffic, elderly care, the tracking of people and vehicles in crowded environments, and the acquisition of more realistic images for consumer electronics and entertainment. In most of these applications, multiple sensors such a…
Financial Products provides a step-by-step guide to some of the most important ideas underpinning financial mathematics. It describes and explains interest rates, discounting, arbitrage, risk neutral probabilities, forward contracts, futures, bonds, FRA and swaps. It shows howto construct both elementary and more complex (Libor) zero curves. Options are described, illustrated and then priced us…
The field of Distributed Computing covers “all aspects of computing and information access across multiple processing elements connected by any form of communication networks, whether local or wide-area in the coverage”. Since the advent of the Internet in the 1970s, there has been a steady growth of new applications requiring distributed processing. This was enabled by advances in networki…
As cybersecurity threats keep growing exponentially in scale, frequency, and impact, legacy-based threat detection systems have proven inadequate. This has prompted the use of machine learning (hereafter, ML) to help address the problem. But as organizations increasingly use intelligent cybersecurity techniques, the overall efficacy and benefit analysis of these ML-based digital security system…
Optimization is a subject that is widely and increasingly used in science, engineering, economics, management, industry, and other areas. It deals with selecting the best of many possible decisions in real-life environment, constructing computational methods to find optimal solutions, exploring the theoretical properties, and studying the computational performance of numerical algorithms implem…
Global cyberspace is made of complex, multi-layered information networks which encompass the communication networks of the public sector, business community, security authorities and control and monitoring systems used by industry and critical infrastructure which, by means of the Internet, create a worldwide network. Imaginative data processing and utilization, arising from the needs of citize…
The need for more and more bandwidth forces us to think of more granularity. The best promising solution is to use Wavelength Division Multiplexing (WDM) all-optical networks in core networks. Note that an optical network that uses optical transmission and keeps optical data paths through the nodes from source to destination is called all-optical network.
The subjects and disciplines of chemistry and chemical engineering have encountered a new landmark in the way of thinking about, developing, and designing chemical products and processes. This revolutionary philosophy, termed green chemistry and chemical engineering, focuses on the designs of products and processes that are conducive to reducing or eliminating the use and generation of hazardou…
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either a Catalyst 6500 series chassis or a 7600 series router chassis. The “tight” integration with a chassis offers increased flexibility, especially with network virtualization and the incredible throughput that is no…
Times have changed. Computer programming has become much easier, and even so-called normal people now engage in this activity — and even admit it to friends and family. Programming simply means developing instructions that the computer automatically carries out. Excel programming refers to the fact that you can instruct Excel to automatically do things that you normally do manually — saving…
This book will inform about Environmental and health risk assessment and management
The soil environment is a major sink for a multitude of chemicals and heavy metals, which inevitably leads to environmental contamination problems. Indeed, a plethora of different types of heavy metals are used and emanated through various human activities including agricultural, urban or industrial. Millions of tonnes of trace elements are produced every year from mines in demand for newer mat…
The atmosphere’s dynamics have a direct effect on weather conditions and consequently on the climate and human existence. Emissions of air pollutants affect the public health, the ecosystem and result in climatic changes. The first chapter examines in depth the meteorology and the dynamics of the atmosphere. It examines the atmospheric structure, the chemical composition of the atmosphere and…
The advances in sensor design have decreased the size, weight, and cost of sensors by orders of magnitude, yet with the increase of higher spatial and temporal resolution and accuracy. With the fast progress of sensors design and communications technique, sensor networks have also been quickly evolving in both research and practical domains in the last decade. More and more sensor networks have…
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, the certified employee/consultant/job candidate is considered more valuable than one who is not.
Deep learning (also known as deep structured learning) is part of a broader family of machine learning methods based on artificial neural networks with representation learning. Learning can be supervised, semi-supervised or unsupervised. Deep-learning architectures such as deep neural networks, deep belief networks, deep reinforcement learning, recurrent neural networks and convolutional neural…
Big Data has attracted much attention. Many examples are given in the news how new data-driven applications and algorithms provide new insights, enable more effective and efficient operation, and support experts in a wide variety of application domains. This suggests that getting value out of data is easy, but practitioners in the field know better. Obtaining novel, actionable insights from la…
Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber threats, there is both an imperative need and opportunity to grow a new generation of young researchers trained to handle the changing nature of the upcoming cyber security challenges.
Internet of Things (IoT) has become a prominent part of the technologies leveraged by smart cities. IoT enables the collection of data and the processing of information to provide a better value to the city and its citizens. The use of IoT devices in smart cities has enabled many applications that generate security issues despite their provided benefits.
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year. Other anti-virus vendors, including F-Secure, forecast an increase in att…
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed formalicious and illegal purposes have grown substantially. The most current Symantec Internet Security Threat Report announced that over 403 million new threats emerged in 2011. Other antivirus vendors, including F-Secure, document a recent increase in…
I first wrote Applied Cryptography in 1993. Two years later, I wrote the greatly expanded second edition. At this vantage point of two decades later, it can be hard to remember how heady cryptography's promise was back then. These were the early days of the Internet. Most of my friends had e-mail, but that was because most of my friends were techies. Few of us used the World Wide Web. There was…
Doesn’t this book explain how to break into a computer system? Isn’t that illegal and a bad thing at all? I would like to answer both questions with no (at least the second one). Knowledge is never illegal nor something bad, but the things you do with it. You as an admin, programmer, IT manager, or just an interested reader cannot protect yourself if you don’t know the techniques of the a…
Data is all around us and growing at an ever-increasing rate. It’s more important than ever before for businesses to deal with data quickly and effectively to understand their customers, monitor their processes, and support decision-making. If Python and R are the kings of the data world, why, then, should you use JavaScript instead? What role does it play in business, and why do you need to …
Perubahan iklim merupakan isu global yang mulai menjadi topik perbincangan dunia sejak diadakannya Konferensi Tingkat Tinggi Bumi di Rio de Janeiro, Brasil, tahun 1992. Konvensi Perubahan Iklim atau United Nations Framework Convention on Climate Change (UNFCCC) merupakan salah satu konvensi yang tercantum dalam Agenda 21 dan telah disahkan pada konferensi tersebut. Konvensi Perubahan Iklim tela…
It is 2021 and it is hard to find a person who hasn’t heard about Ransomware, as the number of Ransomware attacks is growing exponentially. But how much do you know about these attacks? The book that you have just opened contains not only a comprehensive collection of Ransomware attacks and their history. It goes much deeper.
This book will inform about networking 101
We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance…
Excel spreadsheets are used practically everywhere — they are the cornerstone of many applications and businesses. Excel Services revolutionizes the spreadsheet world by introducing server-side spreadsheet calculation and rendering with unparallel Excel fidelity. This book will guide developers through understanding what Excel Services is, how to work with it, and how to develop applications …
Waste electronic and electrical equipment (WEEE) has been on the agenda of governments, industry and non-governmental organizations for more than 20 years. In the early 1990s it seemed a relatively straightforward issue to deal with. The consistent application of the ‘producer responsibility’and ‘polluter pays’ principles was expected to keep the societal debate simple and to quickly re…
Second editions of books allow us the rare opportunity to look back at what we were saying and doing some years ago, to reflect, to consider what has changed for the better or worse. In 2004 we did not hold back in our concerns for the environment.