The secure state of an operating system or service is the result of a layered security approach. Systems can be shielded from the outside world through firewalls, operating systems have to be kept up to date with the latest security patches, services have to be configured properly, separation of duties has to be implemented for end users, and so forth. Access controls are another layer that adm…
In the 21st century, the fate of the environment has become a critical issue in both developed and developing countries throughout the world. The environment is considered the surroundings in which an organism operates, including air, water, land, natural resources, flora, fauna, humans and their interrelation. Water pollution, poor air quality, global warming, acid rain, ozonosphere hole, …
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book. …
The hacker playbook 2: practical guide to penetration testing This book is not your typical information technology (IT) security book. Even though the authors of this book have technical backgrounds and have worked on such best-selling titles as Syngress’ Hack Proofing Your Network, this book integrates the technical aspects of vulnerability management into the management of your business. Al…
Mobile security is one of the hottest topics today. Android being the leading mobile operating system in the market, it has a huge user base, and lots of personal as well as business data is being stored on Android mobile devices. Mobile devices are now sources of entertainment, business, personal life, and new risks. Attacks targeting mobile devices and apps are on the rise. Android, being the…
This textbook provides study materials for the participants of the course named Multivariate Analysis of Ecological Data that we teach at our university for the third year. Material provided here should serve both for the introductory and the advanced versions of the course. We admit that some parts of the text would profit from further polishing, they are quite rough but we hope in further…
This book is written for a one-term introductory course in IT security. The primary audience is upper-division BS majors in Information Systems, Computer Science, or Computer Information Systems. This book is also intended for graduate students in Masters of Information Systems (MSIS), Master of Business Administration (MBA), Master of Accountancy (MAcc), or other MS programs that are seeking a…
Earthquakes, tsunamis, floods, droughts, disease outbreaks as well as conflicts are all crises that result in death as well as profound disruption to those left behind, and to those communities who shelter them. Among the most urgent interventions are those to provide water, sanitation and hygiene {WASH) to affected communities. Water; Sanitation and Hygiene in Humanitarian Contexts presents …
Does the world really need another introductory textbook on feedback control? For many years we have felt that the many quality textbooks that currently exist are more than sufficient. However, several years ago the first author (RWB) had an experience that changed my mind, and the minds of my colleagues. I had just finished teaching the introductory feedback control course at BYU. I had a need…
Explores the history of Android attacks and covers static and dynamic approaches to analyzing real malware specimens, machine-learning techniques to detect malicious apps, and how to identify banking trojans, ransomware, and SMS fraud
Introduction to Health and Safety at Work has quickly established itself, in its first six years, as the foremost text for students taking the NEBOSH National General Certificate. It is also of great value to those studying for level 3 N/SVQ, the IOSH Managing Safely Award and similar management and supervisor focused learning. It has become a significant work of reference for managers with hea…
This is the second iteration of The Hacker Playbook (THP). For those that read the first book, this is an extension of that book. Below is an overview of all of the new vulnerabilities and attacks that will be discussed. In addition to the new content, attacks and techniques from the first book, which are still relevant today, are included to eliminate the need to refer back to the first book.
This book provides an in-depth analysis of the Australian cybercrime landscape, covering the latest trends, tools, and tactics used by cybercriminals. The book also explores the steps being taken by Australian authorities and cybersecurity professionals to address these threats. Through theory, case studies, and real-world examples, this book offers a comprehensive overview of the challenges fa…
Counterintelligence refers to the efforts undertaken by intelligence agencies to prevent and detect attempts by foreign entities to gather sensitive or classifed information from a country's government, military, businesses, or other organizations. In the twentyfirst century, counterintelligence has become increasingly important as the world has become more connected through the internet and di…
There are not many security-related books in Chinese; the few that have been published deal mostly with handy skills when countering hacker attacks. This book not only describes skills and techniques but also tries to solve security problems in a constructive manner. What I admire about Wu is that he is always willing to collaborate with his colleagues to build a more secure Internet environmen…
This book is focused on the complex problem of controlling air pollution and mitigating its adverse effects on human health and the environment. It is written by leading experts in the field and addresses many aspects of air pollution, including monitoring and source characterization of air pollution, the theory and application of air quality modeling, health effects and risk assessment, air qu…
This book is primarily addressed to students who are taking a course on the C++ language, to those who wish to self-study the C++ language, as well as to programmers who have experience with C and want to move on to C++. It could also prove useful to instructors of the C++ course, who are looking for explanatory programming examples to add in their lectures.
This book is ideal for Python programmers who want to explore the tools available in the Python ecosystem in order to build their own IoT web stack and IoT-related projects. People from creative and designing backgrounds will also find this book equally useful.
This book is about using data to understand how social media services are used. Since the advent of Web 2.0, sites and services that give their users the power to actively change and contribute to the services’ content have exploded in popularity. Social media finds its roots in early social networking and community communication services, including the bulletin board systems (BBS) of the 198…
Because of the increasing complexity and growth of real-world networks, their analysis by using classical graph-theoretic methods is oftentimes a difficult procedure. Thus, there is a strong need to combine graph-theoretic methods with mathematical techniques from other scientific disciplines, such as machine learning, statistics, and information theory, for analyzing complex networks more adeq…
The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advanta…
Designing a software system is difficult. Understanding the context in which a software system lives is more difficult. In order to understand that context, developers need to communicate with the business. But there is a lot that can go wrong while communicating with the business. For example people can misunderstand what is being said, they are scared to speak up, tensions could grow, and con…
The response to the first and second editions of Python Crash Course has been overwhelmingly positive. More than one million copies are in print, including translations in over 10 languages. I’ve received letters and emails from readers as young as 10, as well as from retirees who want to learn to program in their free time. Python Crash Course is being used in middle schools and high schools…
Riset tanaman obat dari hutan merupakan program riset prioritas nasional bagi Kementerian Kesehatan. Namun demikian, Kementerian Lingkungan Hidup dan Kehutanan (KLHK) dalam hal ini Badan Litbang dan Inovasi (BLI) sebagai penanggungjawab dan pengelola riset yang berkaitan dengan bioprospeksi dari biodiversitas hutan tropis, juga melakukan riset tanaman obat dari hutan tropis Indonesia. Output u…
Plastics are increasingly used in modern-day life due to their wide-ranging properties which can be used in a variety of applications. ‘Plastics Waste Management: Processing and Disposal’ is primarily written from an industrial point-of-view and relates waste management to understanding the correct processes for dealing with the growing issue of plastics waste. This book mainly focuses on p…