Skip to main content

Books in Information systems

61-70 of 254 results in All results

Guerrilla Analytics

  • 1st Edition
  • September 23, 2014
  • Enda Ridge
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 1 8 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 5 0 3 - 3
Doing data science is difficult. Projects are typically very dynamic with requirements that change as data understanding grows. The data itself arrives piecemeal, is added to, replaced, contains undiscovered flaws and comes from a variety of sources. Teams also have mixed skill sets and tooling is often limited. Despite these disruptions, a data science team must get off the ground fast and begin demonstrating value with traceable, tested work products. This is when you need Guerrilla Analytics. In this book, you will learn about: The Guerrilla Analytics Principles: simple rules of thumb for maintaining data provenance across the entire analytics life cycle from data extraction, through analysis to reporting. Reproducible, traceable analytics: how to design and implement work products that are reproducible, testable and stand up to external scrutiny. Practice tips and war stories: 90 practice tips and 16 war stories based on real-world project challenges encountered in consulting, pre-sales and research. Preparing for battle: how to set up your team's analytics environment in terms of tooling, skill sets, workflows and conventions. Data gymnastics: over a dozen analytics patterns that your team will encounter again and again in projects

Hacking and Penetration Testing with Low Power Devices

  • 1st Edition
  • August 29, 2014
  • Philip Polstra
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 5 1 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 2 4 - 9
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!

Modern Enterprise Business Intelligence and Data Management

  • 1st Edition
  • August 28, 2014
  • Alan Simon
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 5 3 9 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 7 4 5 - 6
Nearly every large corporation and governmental agency is taking a fresh look at their current enterprise-scale business intelligence (BI) and data warehousing implementations at the dawn of the "Big Data Era"…and most see a critical need to revitalize their current capabilities. Whether they find the frustrating and business-impeding continuation of a long-standing "silos of data" problem, or an over-reliance on static production reports at the expense of predictive analytics and other true business intelligence capabilities, or a lack of progress in achieving the long-sought-after enterprise-wide "single version of the truth" – or all of the above – IT Directors, strategists, and architects find that they need to go back to the drawing board and produce a brand new BI/data warehousing roadmap to help move their enterprises from their current state to one where the promises of emerging technologies and a generation’s worth of best practices can finally deliver high-impact, architecturally evolvable enterprise-scale business intelligence and data warehousing. Author Alan Simon, whose BI and data warehousing experience dates back to the late 1970s and who has personally delivered or led more than thirty enterprise-wide BI/data warehousing roadmap engagements since the mid-1990s, details a comprehensive step-by-step approach to building a best practices-driven, multi-year roadmap in the quest for architecturally evolvable BI and data warehousing at the enterprise scale. Simon addresses the triad of technology, work processes, and organizational/human factors considerations in a manner that blends the visionary and the pragmatic.

Bitemporal Data

  • 1st Edition
  • August 19, 2014
  • Tom Johnston
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 8 0 6 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 8 0 5 5 - 3
Bitemporal data has always been important. But it was not until 2011 that the ISO released a SQL standard that supported it. Currently, among major DBMS vendors, Oracle, IBM and Teradata now provide at least some bitemporal functionality in their flagship products. But to use these products effectively, someone in your IT organization needs to know more than how to code bitemporal SQL statements. Perhaps, in your organization, that person is you. To correctly interpret business requests for temporal data, to correctly specify requirements to your IT development staff, and to correctly design bitemporal databases and applications, someone in your enterprise needs a deep understanding of both the theory and the practice of managing bitemporal data. Someone also needs to understand what the future may bring in the way of additional temporal functionality, so their enterprise can plan for it. Perhaps, in your organization, that person is you. This is the book that will show the do-it-yourself IT professional how to design and build bitemporal databases and how to write bitemporal transactions and queries, and will show those who will direct the use of vendor-provided bitemporal DBMSs exactly what is going on "under the covers" of that software.

Building an Information Security Awareness Program

  • 1st Edition
  • August 7, 2014
  • Bill Gardner + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 6 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 8 1 - 1
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. Forewords written by Dave Kennedy and Kevin Mitnick!

Time and Relational Theory

  • 2nd Edition
  • July 16, 2014
  • C.J. Date + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 6 3 1 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 6 7 5 - 7
Time and Relational Theory provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally, database management systems provide little or no special support for temporal data at all. This situation is changing because: Cheap storage enables retention of large volumes of historical data in data warehouses Users are now faced with temporal data problems, and need solutions Temporal features have recently been incorporated into the SQL standard, and vendors have begun to add temporal support to their DBMS products Based on the groundbreaking text Temporal Data & the Relational Model (Morgan Kaufmann, 2002) and new research led by the authors, Time and Relational Theory is the only book to offer a complete overview of the functionality of a temporal DBMS. Expert authors Nikos Lorentzos, Hugh Darwen, and Chris Date describe an approach to temporal database management that is firmly rooted in classical relational theory and will stand the test of time. This book covers the SQL:2011 temporal extensions in depth and identifies and discusses the temporal functionality still missing from SQL.

Concurrency Control in Distributed Database Systems

  • 1st Edition
  • Volume 3
  • June 28, 2014
  • W. Cellary + 2 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 6 4 - 3
Distributed Database Systems (DDBS) may be defined as integrated database systems composed of autonomous local databases, geographically distributed and interconnected by a computer network.The purpose of this monograph is to present DDBS concurrency control algorithms and their related performance issues. The most recent results have been taken into consideration. A detailed analysis and selection of these results has been made so as to include those which will promote applications and progress in the field. The application of the methods and algorithms presented is not limited to DDBSs but also relates to centralized database systems and to database machines which can often be considered as particular examples of DDBSs.The first part of the book is devoted to basic definitions and models: the distributed database model, the transaction model and the syntactic and semantic concurrency control models. The second discusses concurrency control methods in monoversion DDBSs: the locking method, the timestamp ordering method, the validation method and hybrid methods. For each method the concept, the basic algorithms, a hierarchical version of the basic algorithms, and methods for avoiding performance failures are given. The third section covers concurrency control methods in multiversion DDBSs and the fourth, methods for the semantic concurrency model. The last part concerns performance issues of DDBSs.The book is intended primarily for DDBMS designers, but is also of use to those who are engaged in the design and management of databases in general, as well as in problems of distributed system management such as distributed operating systems and computer networks.

Dynamic Modelling of Information Systems

  • 1st Edition
  • June 28, 2014
  • K.M. van Hee + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 8 4 - 1
The use of dynamic models in the development of information systems is regarded by many researchers as a promising issue in design support. Modelling the dynamics of information systems is likely to improve the quality and the performance of the design products. Dynamic modelling as a new approach for dynamic analysis of problems within an existing situation, and design and evaluation of different solution strategies may overcome many difficulties in the design process.

The Basics of Information Security

  • 2nd Edition
  • May 20, 2014
  • Jason Andress
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 7 4 4 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 1 2 - 6
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.