Skip to main content

Books in Computing milieux

Covering human-computer interaction, virtual environments, and ubiquitous computing, this portfolio supports the design of intuitive, immersive, and accessible systems. Featuring the latest research and practical case studies, these titles assist researchers, designers, and developers in creating user-centric technologies. Addressing accessibility, usability, and emerging interfaces, the collection fosters innovation that enhances everyday digital experiences.

    • The Basics of IT Audit

      Purposes, Processes, and Practical Information
      • 1st Edition
      • Stephen D. Gantz
      • English
      The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
    • Information Technology Standards

      Quest for the Common Byte
      • 1st Edition
      • Martin Libicki
      • English
      This book examines information technology standards and discusses what they are, what they do, how they originate, and how they evolve.While standards are important in improving system interoperability and thereby increasing economic productivity, they are unlikely to achieve their full potential due to a variety of factors, chief of which is the politics of the standard process itself.Libicki points out that the government is not likely the best source for designing and promoting standards. He does an excellent job of breaking down many complex technical issues and presenting them in a fashion that technical people can enjoy and policy makers can understand.
    • Software Engineering Education

      Proceedings of the IFIP WG3.4/SEARCC (SRIG on Education and Training) Working Conference, Hong Kong, 28 September - 2 October, 1993
      • 1st Edition
      • Volume 40
      • B.Z. Barta + 2 more
      • English
      Software engineering education is an important, often controversial, issue in the education of Information Technology professionals. It is of concern at all levels of education, whether undergraduate, post-graduate or during the working life of professionals in the field. This publication gives perspectives from academic institutions, industry and education bodies from many different countries. Several papers provide actual curricula based on innovative ideas and modern programming paradigms. Various aspects of project work, as an important component of the educational process, are also covered and the uses of software tools in the software industry and education are discussed. The book provides a valuable source of information for all those interested and involved in software engineering education.
    • Eleventh Hour CISSP

      Study Guide
      • 2nd Edition
      • Joshua Feldman + 2 more
      • English
      Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All 10 domains are covered as completely and as concisely as possible, giving you the best possible chance of acing the exam.
    • Cyber Warfare

      Techniques, Tactics and Tools for Security Practitioners
      • 2nd Edition
      • Jason Andress + 1 more
      • English
      Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
    • FISMA Compliance Handbook

      Second Edition
      • 1st Edition
      • Laura P. Taylor
      • English
      This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
    • The Basics of Hacking and Penetration Testing

      Ethical Hacking and Penetration Testing Made Easy
      • 2nd Edition
      • Patrick Engebretson
      • English
      The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
    • IT Manager's Handbook

      Getting your New Job Done
      • 3rd Edition
      • Bill Holtsnider + 1 more
      • English
      IT Manager’s Handbook, Third Edition, provides a practical reference that you will return to again and again in an ever-changing corporate environment where the demands on IT continue to increase. Make your first 100 days really count with the fundamental principles and core concepts critical to your success as a new IT Manager. This is a must-read for new IT managers and a great refresher for seasoned managers trying to maintain expertise in the rapidly changing IT world. This latest edition includes discussions on how to develop an overall IT strategy as well as demonstrate the value of IT to the company. It will teach you how to: manage your enterprise’s new level of connectivity with a new chapter covering social media, handheld devices, and more; implement and optimize cloud services to provide a better experience for your mobile and virtual workforce at a lower cost to your bottom line; integrate mobile applications into your company’s strategy; and manage the money, including topics such as department budgets and leasing versus buying. You will also learn how to work with your customers, whomever those might be for your IT shop; hire, train, and manage your team and their projects so that you come in on time and budget; and secure your systems to face some of today's most challenging security challenges. This book will appeal to new IT managers in all areas of specialty, including technical professionals who are transitioning into IT management.
    • Low Tech Hacking

      Street Smarts for Security Professionals
      • 1st Edition
      • Terry Gudaitis + 4 more
      • English
      Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
    • IMS Application Developer's Handbook

      Creating and Deploying Innovative IMS Applications
      • 1st Edition
      • Rogier Noldus + 5 more
      • English
      IMS Application Developer’s Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it "live" on an operator’s network. It offers practical guidance on building innovative applications using the features and capabilities of the IMS network, and shows how the rapidly changing development environment is impacting on the business models employed in the industry and how existing network solutions can be moved towards IMS. Elaborating on how IMS applies basic VoIP principles and techniques to realize a true multi-access, and multimedia network, this book ensures that developers know how to use IMS most effectively for applications. Written by established experts in the IMS core network and IMS service layer, with roots in ISDN and GSM, with experience from working at Ericsson, who have been active in standardisation and technology development and who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and service. The authors of this book bring their in-depth and extensive knowledge in the organizations involved in the IMS standardization and its architecture.