The book uses examples and case studies to show that cost optimization and not cost reduction is the right approach to maximizing profitability and enterprise value. Indeed, it is the only way to achieve sustainable profitability. In this book, the science of process improvement, the art of finance, and the enabling powers of information technology come together to make the case for a dependabl…
This book assumes that you are a competent computer user. That means you have used a computer at work and at home, are comfortable with email and web browsers, and know what words like RAM and USB mean. For instructors considering this as a textbook, that means that students will have had some basic understanding of PCs, but need not have had formal computer courses. For this reason, there is a…
While this book is published as a first edition for various reasons, this book and the companion Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide represent the seventh books in a long line of Cisco Press books focused on helping people pass the CCENT and CCNA Routing and Switching certifications. Given the long history, many people have worked on these books from their incepti…
Since the seminal book “Software Ecosystem” by Messerschmitt and Szyperski in 2003, software ecosystems have become a very active topic of research in software engineering. As the different chapters of this book will reveal, software ecosystems exist in many different forms and flavors, so it is difficult to provide a unique encompassing definition. But a key aspect of such software ecosyst…
Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field …
In this book, we will shake the preconceived ideas (Rust is too complex for the real world, Rust is not productive...) and see how to architect and create real-world Rust projects applied to offensive security. We will see how polyvalent Rust is, which enables its users to replace the plethora of programming languages (Python, Ruby, C, C++...) plaguing the offensive security world with a unique…
The secure state of an operating system or service is the result of a layered security approach. Systems can be shielded from the outside world through firewalls, operating systems have to be kept up to date with the latest security patches, services have to be configured properly, separation of duties has to be implemented for end users, and so forth. Access controls are another layer that adm…
In the 21st century, the fate of the environment has become a critical issue in both developed and developing countries throughout the world. The environment is considered the surroundings in which an organism operates, including air, water, land, natural resources, flora, fauna, humans and their interrelation. Water pollution, poor air quality, global warming, acid rain, ozonosphere hole, …
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book. …
The hacker playbook 2: practical guide to penetration testing This book is not your typical information technology (IT) security book. Even though the authors of this book have technical backgrounds and have worked on such best-selling titles as Syngress’ Hack Proofing Your Network, this book integrates the technical aspects of vulnerability management into the management of your business. Al…
Mobile security is one of the hottest topics today. Android being the leading mobile operating system in the market, it has a huge user base, and lots of personal as well as business data is being stored on Android mobile devices. Mobile devices are now sources of entertainment, business, personal life, and new risks. Attacks targeting mobile devices and apps are on the rise. Android, being the…
This textbook provides study materials for the participants of the course named Multivariate Analysis of Ecological Data that we teach at our university for the third year. Material provided here should serve both for the introductory and the advanced versions of the course. We admit that some parts of the text would profit from further polishing, they are quite rough but we hope in further…
This book is written for a one-term introductory course in IT security. The primary audience is upper-division BS majors in Information Systems, Computer Science, or Computer Information Systems. This book is also intended for graduate students in Masters of Information Systems (MSIS), Master of Business Administration (MBA), Master of Accountancy (MAcc), or other MS programs that are seeking a…
Earthquakes, tsunamis, floods, droughts, disease outbreaks as well as conflicts are all crises that result in death as well as profound disruption to those left behind, and to those communities who shelter them. Among the most urgent interventions are those to provide water, sanitation and hygiene {WASH) to affected communities. Water; Sanitation and Hygiene in Humanitarian Contexts presents …
Does the world really need another introductory textbook on feedback control? For many years we have felt that the many quality textbooks that currently exist are more than sufficient. However, several years ago the first author (RWB) had an experience that changed my mind, and the minds of my colleagues. I had just finished teaching the introductory feedback control course at BYU. I had a need…
Explores the history of Android attacks and covers static and dynamic approaches to analyzing real malware specimens, machine-learning techniques to detect malicious apps, and how to identify banking trojans, ransomware, and SMS fraud
Introduction to Health and Safety at Work has quickly established itself, in its first six years, as the foremost text for students taking the NEBOSH National General Certificate. It is also of great value to those studying for level 3 N/SVQ, the IOSH Managing Safely Award and similar management and supervisor focused learning. It has become a significant work of reference for managers with hea…
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book.
This book provides an in-depth analysis of the Australian cybercrime landscape, covering the latest trends, tools, and tactics used by cybercriminals. The book also explores the steps being taken by Australian authorities and cybersecurity professionals to address these threats. Through theory, case studies, and real-world examples, this book offers a comprehensive overview of the challenges fa…
Counterintelligence refers to the efforts undertaken by intelligence agencies to prevent and detect attempts by foreign entities to gather sensitive or classifed information from a country's government, military, businesses, or other organizations. In the twentyfirst century, counterintelligence has become increasingly important as the world has become more connected through the internet and di…
There are not many security-related books in Chinese; the few that have been published deal mostly with handy skills when countering hacker attacks. This book not only describes skills and techniques but also tries to solve security problems in a constructive manner. What I admire about Wu is that he is always willing to collaborate with his colleagues to build a more secure Internet environmen…
This book is focused on the complex problem of controlling air pollution and mitigating its adverse effects on human health and the environment. It is written by leading experts in the field and addresses many aspects of air pollution, including monitoring and source characterization of air pollution, the theory and application of air quality modeling, health effects and risk assessment, air qu…
This book is primarily addressed to students who are taking a course on the C++ language, to those who wish to self-study the C++ language, as well as to programmers who have experience with C and want to move on to C++. It could also prove useful to instructors of the C++ course, who are looking for explanatory programming examples to add in their lectures.