Skip to main content

Books in Computing milieux

11-20 of 45 results in All results

Accelerating MATLAB with GPU Computing

  • 1st Edition
  • November 18, 2013
  • Jung W. Suh + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 8 0 8 0 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 9 1 6 - 8
Beyond simulation and algorithm development, many developers increasingly use MATLAB even for product deployment in computationally heavy fields. This often demands that MATLAB codes run faster by leveraging the distributed parallelism of Graphics Processing Units (GPUs). While MATLAB successfully provides high-level functions as a simulation tool for rapid prototyping, the underlying details and knowledge needed for utilizing GPUs make MATLAB users hesitate to step into it. Accelerating MATLAB with GPUs offers a primer on bridging this gap. Starting with the basics, setting up MATLAB for CUDA (in Windows, Linux and Mac OS X) and profiling, it then guides users through advanced topics such as CUDA libraries. The authors share their experience developing algorithms using MATLAB, C++ and GPUs for huge datasets, modifying MATLAB codes to better utilize the computational power of GPUs, and integrating them into commercial software products. Throughout the book, they demonstrate many example codes that can be used as templates of C-MEX and CUDA codes for readers’ projects. Download example codes from the publisher's website: http://booksite.elsevier.com/9780124080805/

The Basics of IT Audit

  • 1st Edition
  • October 31, 2013
  • Stephen D. Gantz
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 1 5 9 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 7 6 - 3
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.

Software Engineering Education

  • 1st Edition
  • Volume 40
  • October 22, 2013
  • B.Z. Barta + 2 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 3 2 5 - 7
Software engineering education is an important, often controversial, issue in the education of Information Technology professionals. It is of concern at all levels of education, whether undergraduate, post-graduate or during the working life of professionals in the field. This publication gives perspectives from academic institutions, industry and education bodies from many different countries. Several papers provide actual curricula based on innovative ideas and modern programming paradigms. Various aspects of project work, as an important component of the educational process, are also covered and the uses of software tools in the software industry and education are discussed. The book provides a valuable source of information for all those interested and involved in software engineering education.

Eleventh Hour CISSP

  • 2nd Edition
  • October 16, 2013
  • Joshua Feldman + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 4 5 - 9
Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All 10 domains are covered as completely and as concisely as possible, giving you the best possible chance of acing the exam.

Cyber Warfare

  • 2nd Edition
  • October 1, 2013
  • Jason Andress + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 6 7 2 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 6 3 3 - 2
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

FISMA Compliance Handbook

  • 1st Edition
  • August 20, 2013
  • Laura P. Taylor
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 5 8 7 1 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 5 9 1 5 - 3
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.

The Basics of Hacking and Penetration Testing

  • 2nd Edition
  • June 24, 2013
  • Patrick Engebretson
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 6 4 4 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 6 4 1 - 2
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.

IT Manager's Handbook

  • 3rd Edition
  • February 22, 2012
  • Bill Holtsnider + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 5 9 4 9 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 3 9 1 4 0 5 - 7
IT Manager’s Handbook, Third Edition, provides a practical reference that you will return to again and again in an ever-changing corporate environment where the demands on IT continue to increase. Make your first 100 days really count with the fundamental principles and core concepts critical to your success as a new IT Manager. This is a must-read for new IT managers and a great refresher for seasoned managers trying to maintain expertise in the rapidly changing IT world. This latest edition includes discussions on how to develop an overall IT strategy as well as demonstrate the value of IT to the company. It will teach you how to: manage your enterprise’s new level of connectivity with a new chapter covering social media, handheld devices, and more; implement and optimize cloud services to provide a better experience for your mobile and virtual workforce at a lower cost to your bottom line; integrate mobile applications into your company’s strategy; and manage the money, including topics such as department budgets and leasing versus buying. You will also learn how to work with your customers, whomever those might be for your IT shop; hire, train, and manage your team and their projects so that you come in on time and budget; and secure your systems to face some of today's most challenging security challenges. This book will appeal to new IT managers in all areas of specialty, including technical professionals who are transitioning into IT management.

Low Tech Hacking

  • 1st Edition
  • December 13, 2011
  • Terry Gudaitis + 4 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 6 6 5 - 0
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 6 6 - 7
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

IMS Application Developer's Handbook

  • 1st Edition
  • July 20, 2011
  • Rogier Noldus + 5 more
  • English
  • Paperback
    9 7 8 - 0 - 0 8 - 1 0 1 6 0 1 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 2 1 9 3 - 5
IMS Application Developer’s Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it "live" on an operator’s network. It offers practical guidance on building innovative applications using the features and capabilities of the IMS network, and shows how the rapidly changing development environment is impacting on the business models employed in the industry and how existing network solutions can be moved towards IMS. Elaborating on how IMS applies basic VoIP principles and techniques to realize a true multi-access, and multimedia network, this book ensures that developers know how to use IMS most effectively for applications. Written by established experts in the IMS core network and IMS service layer, with roots in ISDN and GSM, with experience from working at Ericsson, who have been active in standardisation and technology development and who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and service. The authors of this book bring their in-depth and extensive knowledge in the organizations involved in the IMS standardization and its architecture.