Skip to main content

Books in Software

    • Matlab

      • 4th Edition
      • July 23, 2016
      • Dorothy C. Attaway
      • English
      • eBook
        9 7 8 0 1 2 8 0 4 5 4 1 1
      MATLAB: A Practical Introduction to Programming and Problem Solving, Fourth Edition, winner of a 2017 Textbook Excellence Award (Texty), has been updated to reflect the functionality of the current version of MATLAB, including the new H2 Graphics system. It features new and revised end-of-chapter exercises, more engineering applications to help the reader learn this software tool in context, and a new section on object-oriented programming in MATLAB. MATLAB has become the standard software tool for solving scientific and engineering problems due to its powerful built-in functions and its ability to program. Assuming no knowledge of programming, this book guides the reader through both programming and built-in functions to easily exploit MATLAB's extensive capabilities for tackling engineering problems. The book starts with programming concepts, such as variables, assignments, and selection statements, moves on to loops, and then solves problems using both the programming concept and the power of MATLAB. In-depth coverage is given to input/output, a topic fundamental to many engineering applications.
    • Advanced Persistent Security

      • 1st Edition
      • November 22, 2016
      • Ira Winkler + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 3 1 6 0
      • eBook
        9 7 8 0 1 2 8 0 9 3 6 5 8
      Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
    • Penetration Tester's Open Source Toolkit

      • 4th Edition
      • September 20, 2016
      • Jeremy Faircloth
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 4 9 1
      • eBook
        9 7 8 0 1 2 8 0 2 3 5 3 2
      Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.
    • Programming Massively Parallel Processors

      • 3rd Edition
      • November 24, 2016
      • David B. Kirk + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 1 9 8 6 0
      • eBook
        9 7 8 0 1 2 8 1 1 9 8 7 7
      Programming Massively Parallel Processors: A Hands-on Approach, Third Edition shows both student and professional alike the basic concepts of parallel programming and GPU architecture, exploring, in detail, various techniques for constructing parallel programs. Case studies demonstrate the development process, detailing computational thinking and ending with effective and efficient parallel programs. Topics of performance, floating-point format, parallel patterns, and dynamic parallelism are covered in-depth. For this new edition, the authors have updated their coverage of CUDA, including coverage of newer libraries, such as CuDNN, moved content that has become less important to appendices, added two new chapters on parallel patterns, and updated case studies to reflect current industry practices.
    • Foundations of Quantum Programming

      • 1st Edition
      • March 9, 2016
      • Mingsheng Ying
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 0 6 8
      • eBook
        9 7 8 0 1 2 8 0 2 5 4 6 8
      Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.
    • Windows Registry Forensics

      • 2nd Edition
      • March 3, 2016
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 9 1 6
      • eBook
        9 7 8 0 1 2 8 0 3 3 3 5 7
      Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
    • Protocol Specification, Testing and Verification, XII

      • 1st Edition
      • Volume 8
      • September 20, 2016
      • R.J. Linn + 1 more
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 3 3 4 9
      For more than a decade, researchers and engineers have been addressing the problem of the application of formal description techniques to protocol specification, implementation, testing and verification. This book identifies the many successes that have been achieved within the industrial framework and the difficulties encountered in applying theoretical methods to practical situations.Issues discussed include: testing and certification; verification; validation; environments and automated tools; formal specifications; protocol conversion; implementation; specification languages and models.Consideration is also given to the concerns surrounding education available to students and the need to upgrade and develop this through sponsorship of a study of an appropriate curriculum at both undergraduate and graduate levels. It is hoped this publication will stimulate such support and inspire further research in this important arena.
    • Executing Windows Command Line Investigations

      • 1st Edition
      • June 11, 2016
      • Chet Hosmer + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 2 6 8 2
      • eBook
        9 7 8 0 1 2 8 0 9 2 7 1 2
      The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
    • Certifiable Software Applications 2

      • 1st Edition
      • November 28, 2016
      • Jean-Louis Boulanger
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 1 1 8 5
      • eBook
        9 7 8 0 0 8 1 0 1 1 6 4 5
      Certifiable Software Applications 2: Support Processes explains the process to achieve a certifiable application. This concerns several major topics, skill management, data preparation, requirement management, software verification, and software validation. In addition, analysis of the impact of the use of COTS and pre-existing software on certifiable software is presented. Finally, the last support process concerns the management of commercial tools, the creation of a specific tools, and therefore the qualification of tools, which is based on their impact on the final software.
    • GPU-based Parallel Implementation of Swarm Intelligence Algorithms

      • 1st Edition
      • March 31, 2016
      • Ying Tan
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 3 6 2 7
      • eBook
        9 7 8 0 1 2 8 0 9 3 6 4 1
      GPU-based Parallel Implementation of Swarm Intelligence Algorithms combines and covers two emerging areas attracting increased attention and applications: graphics processing units (GPUs) for general-purpose computing (GPGPU) and swarm intelligence. This book not only presents GPGPU in adequate detail, but also includes guidance on the appropriate implementation of swarm intelligence algorithms on the GPU platform. GPU-based implementations of several typical swarm intelligence algorithms such as PSO, FWA, GA, DE, and ACO are presented and having described the implementation details including parallel models, implementation considerations as well as performance metrics are discussed. Finally, several typical applications of GPU-based swarm intelligence algorithms are presented. This valuable reference book provides a unique perspective not possible by studying either GPGPU or swarm intelligence alone. This book gives a complete and whole picture for interested readers and new comers who will find many implementation algorithms in the book suitable for immediate use in their projects. Additionally, some algorithms can also be used as a starting point for further research.