Skip to main content

Books in Internet and web technology

41-50 of 169 results in All results

Security Risks in Social Media Technologies

  • 1st Edition
  • July 31, 2013
  • Alan Oxley
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 3 8 0 - 0
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.

Practical Anonymity

  • 1st Edition
  • July 19, 2013
  • Peter Loshin
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 0 4 0 4 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 4 4 2 - 6
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing

Blogs and Tweets, Texting and Friending

  • 1st Edition
  • July 4, 2013
  • Sandra M. DeJong
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 8 1 2 8 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 8 0 6 8 - 3
Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes — and their legal and ethical ramifications —made in social media by busy health care professionals. It gives best practices for using social media while maintaining online professionalism. The book goes on to identify categories of caution, from confidentiality of patient information and maintaining the professional's privacy to general netiquette in tweeting, texting, blogging, and friending. And it guides you in setting up a faculty page (or choosing not to) and managing your online footprint. The connected generation regularly uses social media, including health care professionals, but what happens when a patient wants to friend you? Or when you've already posted a rant on a patient that gets viewed by others? What information may already be floating on the Internet that a patient may find about you in a Google search and that might impact your therapeutic relationship? Whether you are new to social media or an expert user in your private life (but haven't thought about what this means for you professionally), this book is for you. It’s the "when" and "how" to use social media effectively while maintaining online professionalism.

The Basics of Web Hacking

  • 1st Edition
  • June 18, 2013
  • Josh Pauli
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 6 0 0 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 6 5 9 - 2
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.

The Plugged-In Professor

  • 1st Edition
  • May 15, 2013
  • Sharmila Ferris + 1 more
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 3 4 2 - 8
New technologies are transforming the way students work. The Plugged in Professor provides a timely and exceptional resource for using social media and other new technologies to help college students meet both general and discipline-specific objectives. The title covers techniques built around well-known social networking technologies, as well as other emerging technologies such as mobile phone and tablet apps. With a practical focus and reader-friendly format, this book shows educators how to apply techniques in each technology, and includes clear student learning objectives, step-by-step directions, observations and advice, and supplemental readings and resources. Twenty-five chapters by leading contributors cover key aspects of new technologies in education, in four parts: Writing, research and information fluency; Communication and collaboration; Critical thinking and creativity; and Integrative learning.

Crisis Management at the Speed of the Internet

  • 1st Edition
  • March 25, 2013
  • Bob Hayes + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 5 9 1 - 0
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster—even if the viral information isn’t factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training. It is a valuable resource for any security professional working to create or improve an existing corporate crisis management policy. Crisis Management at the Speed of the Internet is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

Analyzing the Social Web

  • 1st Edition
  • February 17, 2013
  • Jennifer Golbeck
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 5 5 3 1 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 5 8 5 6 - 9
Analyzing the Social Web provides a framework for the analysis of public data currently available and being generated by social networks and social media, like Facebook, Twitter, and Foursquare. Access and analysis of this public data about people and their connections to one another allows for new applications of traditional social network analysis techniques that let us identify things like who are the most important or influential people in a network, how things will spread through the network, and the nature of peoples' relationships. Analyzing the Social Web introduces you to these techniques, shows you their application to many different types of social media, and discusses how social media can be used as a tool for interacting with the online public.

Intelligent Systems for Security Informatics

  • 1st Edition
  • January 28, 2013
  • Christopher C Yang + 3 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 4 0 4 7 0 2 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 5 9 0 2 - 3
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.

Web Services, Service-Oriented Architectures, and Cloud Computing

  • 2nd Edition
  • December 31, 2012
  • Douglas K. Barry
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 9 8 3 5 7 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 2 0 0 - 8
Web Services, Service-Oriented Architectures, and Cloud Computing is a jargon-free, highly illustrated explanation of how to leverage the rapidly multiplying services available on the Internet. The future of business will depend on software agents, mobile devices, public and private clouds, big data, and other highly connected technology. IT professionals will need to evaluate and combine online services into service-oriented architectures (SOA), often depending on Web services and cloud computing. This can mean a fundamental shift away from custom software and towards a more nimble use of semantic vocabularies, middle-tier systems, adapters and other standardizing aspects. This book is a guide for the savvy manager who wants to capitalize on this technological revolution. It begins with a high-level example of how an average person might interact with a service-oriented architecture, and progresses to more detail, discussing technical forces driving adoption and how to manage technology, culture and personnel issues that can arise during adoption. An extensive reference section provides quick access to commonly used terms and concepts.

The Basics of Cyber Warfare

  • 1st Edition
  • November 16, 2012
  • Jason Andress + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 4 7 3 7 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 5 1 8 1 - 2
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.

Related subjects