Skip to main content

Books in Software

71-80 of 530 results in All results

Certifiable Software Applications 1

  • 1st Edition
  • July 4, 2016
  • Jean-Louis Boulanger
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 1 1 7 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 1 1 6 5 - 2
Certifiable Software Applications 1: Main Processes is dedicated to the establishment of quality assurance and safety assurance. It establishes the context for achieving a certifiable software application. In it, the author covers recent developments such as the module, component and product line approach. Applicable standards are presented and security principles are described and discussed. Finally, the requirements for mastering quality and configuration are explained. In this book the reader will find the fundamental practices from the field and an introduction to the concept of software application.

Executing Windows Command Line Investigations

  • 1st Edition
  • June 11, 2016
  • Chet Hosmer + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 2 6 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 2 7 1 - 2
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.

Intel Xeon Phi Processor High Performance Programming

  • 2nd Edition
  • May 31, 2016
  • James Jeffers + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 1 9 4 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 1 9 5 - 1
Intel Xeon Phi Processor High Performance Programming is an all-in-one source of information for programming the Second-Generation Intel Xeon Phi product family also called Knights Landing. The authors provide detailed and timely Knights Landingspecific details, programming advice, and real-world examples. The authors distill their years of Xeon Phi programming experience coupled with insights from many expert customers — Intel Field Engineers, Application Engineers, and Technical Consulting Engineers — to create this authoritative book on theessentials of programming for Intel Xeon Phi products. Intel® Xeon Phi™ Processor High-Performance Programming is useful even before you ever program a system with an Intel Xeon Phi processor. To help ensure that your applications run at maximum efficiency, the authors emphasize key techniques for programming any modern parallel computing system whether based on Intel Xeon processors, Intel Xeon Phi processors, or other high-performance microprocessors. Applying these techniques will generally increase your program performance on any system and prepareyou better for Intel Xeon Phi processors.

OS X Incident Response

  • 1st Edition
  • May 6, 2016
  • Jaron Bradley
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 6 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 3 - 9
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating many crimes but businesses are recognizing the importance of having skilled forensic investigators on staff in the case of policy violations. Perhaps more importantly, though, businesses are seeing enormous impact from malware outbreaks as well as data breaches. The skills of a forensic investigator are critical to determine the source of the attack as well as the impact. While there is a lot of focus on Windows because it is the predominant desktop operating system, there are currently very few resources available for forensic investigators on how to investigate attacks, gather evidence and respond to incidents involving OS X. The number of Macs on enterprise networks is rapidly increasing, especially with the growing prevalence of BYOD, including iPads and iPhones. Author Jaron Bradley covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. Instead of using expensive commercial tools that clone the hard drive, you will learn how to write your own Python and bash-based response scripts. These scripts and methodologies can be used to collect and analyze volatile data immediately.   For online source codes, please visit: https://github.com/jbradley89/osx_incident_response_scripting_and_analysis

Pervasive Computing

  • 1st Edition
  • April 13, 2016
  • Ciprian Dobre + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 6 6 3 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 7 0 2 - 7
Pervasive Computing: Next Generation Platforms for Intelligent Data Collection presents current advances and state-of-the-art work on methods, techniques, and algorithms designed to support pervasive collection of data under ubiquitous networks of devices able to intelligently collaborate towards common goals. Using numerous illustrative examples and following both theoretical and practical results the authors discuss: a coherent and realistic image of today’s architectures, techniques, protocols, components, orchestration, choreography, and developments related to pervasive computing components for intelligently collecting data, resource, and data management issues; the importance of data security and privacy in the era of big data; the benefits of pervasive computing and the development process for scientific and commercial applications and platforms to support them in this field. Pervasive computing has developed technology that allows sensing, computing, and wireless communication to be embedded in everyday objects, from cell phones to running shoes, enabling a range of context-aware applications. Pervasive computing is supported by technology able to acquire and make use of the ubiquitous data sensed or produced by many sensors blended into our environment, designed to make available a wide range of new context-aware applications and systems. While such applications and systems are useful, the time has come to develop the next generation of pervasive computing systems. Future systems will be data oriented and need to support quality data, in terms of accuracy, latency and availability. Pervasive Computing is intended as a platform for the dissemination of research efforts and presentation of advances in the pervasive computing area, and constitutes a flagship driver towards presenting and supporting advanced research in this area. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS    

GPU-based Parallel Implementation of Swarm Intelligence Algorithms

  • 1st Edition
  • March 31, 2016
  • Ying Tan
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 3 6 2 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 3 6 4 - 1
GPU-based Parallel Implementation of Swarm Intelligence Algorithms combines and covers two emerging areas attracting increased attention and applications: graphics processing units (GPUs) for general-purpose computing (GPGPU) and swarm intelligence. This book not only presents GPGPU in adequate detail, but also includes guidance on the appropriate implementation of swarm intelligence algorithms on the GPU platform. GPU-based implementations of several typical swarm intelligence algorithms such as PSO, FWA, GA, DE, and ACO are presented and having described the implementation details including parallel models, implementation considerations as well as performance metrics are discussed. Finally, several typical applications of GPU-based swarm intelligence algorithms are presented. This valuable reference book provides a unique perspective not possible by studying either GPGPU or swarm intelligence alone. This book gives a complete and whole picture for interested readers and new comers who will find many implementation algorithms in the book suitable for immediate use in their projects. Additionally, some algorithms can also be used as a starting point for further research.

Matrix Algorithms in MATLAB

  • 1st Edition
  • March 29, 2016
  • Ong U. Routh
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 8 0 4 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 6 9 - 7
Matrix Algorithms in MATLAB focuses on the MATLAB code implementations of matrix algorithms. The MATLAB codes presented in the book are tested with thousands of runs of MATLAB randomly generated matrices, and the notation in the book follows the MATLAB style to ensure a smooth transition from formulation to the code, with MATLAB codes discussed in this book kept to within 100 lines for the sake of clarity. The book provides an overview and classification of the interrelations of various algorithms, as well as numerous examples to demonstrate code usage and the properties of the presented algorithms. Despite the wide availability of computer programs for matrix computations, it continues to be an active area of research and development. New applications, new algorithms, and improvements to old algorithms are constantly emerging.

Foundations of Quantum Programming

  • 1st Edition
  • March 9, 2016
  • Mingsheng Ying
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 0 6 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 5 4 6 - 8
Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.

Windows Registry Forensics

  • 2nd Edition
  • March 3, 2016
  • Harlan Carvey
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 2 9 1 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 3 3 5 - 7
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.

Computer Organization and Design ARM Edition

  • 1st Edition
  • March 2, 2016
  • David A. Patterson + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 7 3 3 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 8 3 5 - 4
The new ARM Edition of Computer Organization and Design features a subset of the ARMv8-A architecture, which is used to present the fundamentals of hardware technologies, assembly language, computer arithmetic, pipelining, memory hierarchies, and I/O. With the post-PC era now upon us, Computer Organization and Design moves forward to explore this generational change with examples, exercises, and material highlighting the emergence of mobile computing and the Cloud. Updated content featuring tablet computers, Cloud infrastructure, and the ARM (mobile computing devices) and x86 (cloud computing) architectures is included. An online companion Web site provides links to a free version of the DS-5 Community Edition (a free professional quality tool chain developed by ARM), as well as additional advanced content for further study, appendices, glossary, references, and recommended reading.