Skip to main content

Books in Information systems general

11-20 of 45 results in All results

Hacking and Penetration Testing with Low Power Devices

  • 1st Edition
  • August 29, 2014
  • Philip Polstra
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 5 1 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 2 4 - 9
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!

Building an Information Security Awareness Program

  • 1st Edition
  • August 7, 2014
  • Bill Gardner + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 6 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 8 1 - 1
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. Forewords written by Dave Kennedy and Kevin Mitnick!

The Basics of Information Security

  • 2nd Edition
  • May 20, 2014
  • Jason Andress
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 4 4 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 1 2 - 6
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.

Machine Takeover

  • 1st Edition
  • May 18, 2014
  • Frank George
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 8 8 0 3 - 4
Machine Takeover: The Growing Threat to Human Freedom in a Computer-Controlled Society discusses the implications of technological advancement. The title identifies the changes in society that no one is aware of, along with what this changes entails. The text first covers the information science, particularly the aspect of an automated system for information processing. Next, the selection deals with social implications of information science, such as information pollution. The text also tackles the concerns in the utilization of technology in order to manipulate the lives of people without their knowledge. In Part III, the title covers the science of cybernetics and artificial intelligence. The last part tackles the consequences of modern science. The book will be of great interest to readers who are concerned with the direction of contemporary science.

Systems Approach to Appropriate Technology Transfer

  • 1st Edition
  • May 17, 2014
  • P. Fleissner
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 4 6 9 4 - 2
Systems Approach to Appropriate Technology Transfer is a collection of selected papers presented at the International Federation of Automatic Control (IFAC) Symposium, held in Vienna, Austria. The objective of the symposium is to analyze the transfer process of technologies by using the systems approach and gather insights that can be used for the enhancement of future transfer programs. The book is a rich presentation of articles and research papers from scientists and engineers from all over the world, and is composed of introductory, technical discussion, and round table discussion papers. The introductory papers give insights to the concepts of technology transfer, systems approach, and use of appropriate technologies. The technical discussions touch on technology transfer in selected fields, energy technologies, flexible manufacturing systems, information and communication, social and educational aspects, and case studies. The four round table discussions focus on the application of technologies to support small-scale enterprises and users’ participation; appropriate technology transfer on microelectronics; policies and strategies for appropriate technology transfer; and the impact of informatics on technology transfer. The text will appeal to computer scientists, engineers, policymakers, and students of information technology.

Children in the Information Age

  • 1st Edition
  • May 17, 2014
  • Blagovest Sendov + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 5 9 0 2 - 7
Children in the Information Age: Opportunities for Creativity, Innovation and New Activities contains selected papers from the Second International Conference and Exhibition ""Children in the Information Age: Opportunities for Creativity, Innovation and New Activities,"" held in Sofia, Bulgaria, 19-23 May 1987. The contributions made by researchers at the conference covered topics such as the past, present, and future of school informatics in the USSR; the family computer boom and its implications for computer literacy; the new meanings of literacy related to new information and communication technologies; computer use in education; and literacy in the information age. Other papers dealt with computer-based training in India; knowledge based systems for use in pedagogical contexts; informatics competitions in Germany; the information age; information and communication technology in the French educational system; and the role of information technology in education in Australia. The final two chapters present the recommendations that emerged from the conference as well as the recommendations of the Working Meeting of Editors of Journals and Magazines on Informatics in Education.

Pragmatic Enterprise Architecture

  • 1st Edition
  • March 15, 2014
  • James Luisi
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 0 5 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 5 0 2 - 6
Pragmatic Enterprise Architecture is a practical hands-on instruction manual for enterprise architects. This book prepares you to better engage IT, management, and business users by equipping you with the tools and knowledge you need to address the most common enterprise architecture challenges. You will come away with a pragmatic understanding of and approach to enterprise architecture and actionable ideas to transform your enterprise. Experienced enterprise architect James V. Luisi generously shares life cycle architectures, transaction path analysis frameworks, and more so you can save time, energy, and resources on your next big project. As an enterprise architect, you must have relatable frameworks and excellent communication skills to do your job. You must actively engage and support a large enterprise involving a hundred architectural disciplines with a modest number of subject matter experts across business, information systems, control systems, and operations architecture. They must achieve their mission using the influence of ideas and business benefits expressed in simple terms so that any audience can understand what to do and why. Pragmatic Enterprise Architecture gives you the tools to accomplish your goals in less time with fewer resources.

Object-Oriented Analysis and Design for Information Systems

  • 1st Edition
  • January 28, 2014
  • Raul Sidnei Wazlawick
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 8 6 7 3 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 2 9 3 - 7
Object-Oriented Analysis and Design for Information Systems clearly explains real object-oriented programming in practice. Expert author Raul Sidnei Wazlawick explains concepts such as object responsibility, visibility and the real need for delegation in detail. The object-oriented code generated by using these concepts in a systematic way is concise, organized and reusable. The patterns and solutions presented in this book are based in research and industrial applications. You will come away with clarity regarding processes and use cases and a clear understand of how to expand a use case. Wazlawick clearly explains clearly how to build meaningful sequence diagrams. Object-Oriented Analysis and Design for Information Systems illustrates how and why building a class model is not just placing classes into a diagram. You will learn the necessary organizational patterns so that your software architecture will be maintainable.

Introduction to Information Security

  • 1st Edition
  • November 12, 2013
  • Timothy Shimeall + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 6 9 - 9
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 7 2 - 9
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.