Skip to main content

Books in Computer systems organization

101-110 of 263 results in All results

Industrial Network Security

  • 1st Edition
  • August 15, 2011
  • Eric D. Knapp + 1 more
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 4 6 - 9
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.

Securing the Cloud

  • 1st Edition
  • April 21, 2011
  • Vic (J.R.) Winkler
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 5 9 2 - 9
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability, scalability, and in the case of security - resilience. Securing the Cloud explains how to make the move to the cloud, detailing the strengths and weaknesses of securing a company's information with different cloud approaches. It offers a clear and concise framework to secure a business' assets while making the most of this new technology.This book considers alternate approaches for securing a piece of the cloud, such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trust. It discusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recovery. It also describes the benefits of moving to the cloud - solving for limited availability of space, power, and storage.This book will appeal to network and security IT staff and management responsible for design, implementation and management of IT structures from admins to CSOs, CTOs, CIOs and CISOs.

Digital Evidence and Computer Crime

  • 3rd Edition
  • April 12, 2011
  • Eoghan Casey
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 2 6 8 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 1 4 8 - 8
Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks. This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks. New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides. This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).

Architecture of Network Systems

  • 1st Edition
  • January 12, 2011
  • Dimitrios Serpanos + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 4 9 4 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 2 8 2 - 9
Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more. Leading researchers Dimitrios Serpanos and Tilman Wolf develop architectures for all network sub-systems, bridging the gap between operation and VLSI.This book provides comprehensive coverage of the technical aspects of network systems, including system-on-chip technologies, embedded protocol processing and high-performance, and low-power design. It develops a functional approach to network system architecture based on the OSI reference model, which is useful for practitioners at every level. It also covers both fundamentals and the latest developments in network systems architecture, including network-on-chip, network processors, algorithms for lookup and classification, and network systems for the next-generation Internet.The book is recommended for practicing engineers designing the architecture of network systems and graduate students in computer engineering and computer science studying network system design.

IT Manager's Handbook

  • 2nd Edition
  • July 26, 2010
  • Bill Holtsnider + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 5 7 4 - 6
IT Manager's Handbook, Second Edition, provides essential information to help students understand the responsibilities of today’s IT Management professionals: not only planning network security and implementing disaster recovery plans, but also such vital tasks as creating budgets, administering compliance, and managing staff. In particular, the book discusses business practices that are most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendor. This updated version includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulatory compliance, and project management. Information is organized modularly so that instructors and students can delve directly into only the topics needed. Each chapter contains additional resources sections for books, articles, and websites relevant to that topic. It contains new material on key technology topics such as open source, outsourcing, offshoring, and handhelds, plus updated coverage of e-commerce, remote access, intranets, and LAN/WAN management.

Digital Design and Computer Architecture

  • 1st Edition
  • July 26, 2010
  • David Harris + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 7 0 6 - 0
Digital Design and Computer Architecture is designed for courses that combine digital logic design with computer organization/architecture or that teach these subjects as a two-course sequence. Digital Design and Computer Architecture begins with a modern approach by rigorously covering the fundamentals of digital logic design and then introducing Hardware Description Languages (HDLs). Featuring examples of the two most widely-used HDLs, VHDL and Verilog, the first half of the text prepares the reader for what follows in the second: the design of a MIPS Processor. By the end of Digital Design and Computer Architecture, readers will be able to build their own microprocessor and will have a top-to-bottom understanding of how it works--even if they have no formal background in design or architecture beyond an introductory class. David Harris and Sarah Harris combine an engaging and humorous writing style with an updated and hands-on approach to digital design.

Microsoft Windows 7 Administrator's Reference

  • 1st Edition
  • April 22, 2010
  • Jorge Orchilles
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 5 6 1 - 5
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 5 6 2 - 2
Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and manage the operating system. The book is divided into 10 chapters. Chapter 1 introduces the Windows 7 and the rationale of releasing this operating system. The next chapter discusses how an administrator can install and upgrade the old operating system from Windows Vista to Windows 7. The deployment of Windows 7 in an organization or other environment is then explained. It also provides the information needed to deploy Windows 7 easily and quickly for both the administrator and end users. Furthermore, the book provides the features of Windows 7 and the ways to manage it properly. The remaining chapters discuss how to secure Windows 7, as well as how to troubleshoot it. This book will serve as a reference and guide for those who want to utilize Windows 7.

The Real Citrix CCA Exam Preparation Kit

  • 1st Edition
  • April 16, 2009
  • Shawn Tooley
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 4 1 9 - 9
The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of general network expertise. The number of CCAs is estimated at between 65 and 70K, up from 45,000 in 2003. Citrix recently released a new version of its most popular product, XenApp (formerly Presentation Server). This new version is fully compatible with Windows Server 2008. To retain their CCA credential, all current CCAs will need to upgrade to the new software. This will be particularly important to those companies enrolled in Citrix partner programs, as current certification is a requirement of the program. When packaged with practice exams, this prep kit will offer an affordable, effective solution for CCA certification and re-certification.

TCP/IP Sockets in C

  • 2nd Edition
  • March 2, 2009
  • Michael J. Donahoo + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 5 4 0 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 3 2 1 - 5
TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies. If you program using Java, be sure to check out this book’s companion, TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition.