Skip to main content

Books in Physical sciences and engineering

    • Essential Skills for Hackers

      • 1st Edition
      • Kevin Cardwell + 1 more
      • English
      Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
    • Mobile Data Loss

      Threats and Countermeasures
      • 1st Edition
      • Michael T. Raggo
      • English
      The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
    • Meeting People via WiFi and Bluetooth

      • 1st Edition
      • Henry Dalziel + 1 more
      • English
      Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
    • Cyber Security Awareness for Accountants and CPAs

      • 1st Edition
      • Henry Dalziel + 1 more
      • English
      Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • Multiscreen UX Design

      Developing for a Multitude of Devices
      • 1st Edition
      • Wolfram Nagel
      • English
      People today use technology on different devices in different locations. Users expect to access information on all relevant screens and across multiple channels through smartphones, tablets, laptops/desktops, smart (internet-connected) TVs, and other devices, such as smartwatches for example. Multiscreen is no longer a nice add-on, it’s a requirement. In this environment, user experience needs to cater to multiple devices. This book provides a holistic approach that will help UX professionals to offer a hands-on guide for UX design across multiple screens. It presents an opportunity to learn how to cater designs for customers. Readers will find patterns, strategies, examples and case studies, methodologies, and insights to help inspire them to develop a viable strategy for their own digital products and services. UX professionals will walk through important elements of multiscreen UX: Investigating the devices and their capabilities Understanding the users and their capabilities Considering the context in which users use these devices Navigating next generation information experiences and the future of content management Designing content and UI architecture for multiscreen projects
    • Data Mapping for Data Warehouse Design

      • 1st Edition
      • Qamar Shahbaz
      • English
      Data mapping in a data warehouse is the process of creating a link between two distinct data models’ (source and target) tables/attributes. Data mapping is required at many stages of DW life-cycle to help save processor overhead; every stage has its own unique requirements and challenges. Therefore, many data warehouse professionals want to learn data mapping in order to move from an ETL (extract, transform, and load data between databases) developer to a data modeler role. Data Mapping for Data Warehouse Design provides basic and advanced knowledge about business intelligence and data warehouse concepts including real life scenarios that apply the standard techniques to projects across various domains. After reading this book, readers will understand the importance of data mapping across the data warehouse life cycle.
    • Fuel Flexible Energy Generation

      Solid, Liquid and Gaseous Fuels
      • 1st Edition
      • John Oakey
      • English
      Fuel Flexible Energy Generation: Solid, Liquid and Gaseous Fuels provides updated information on flexible fuel energy generation, the process by which one or more fuels can be combusted in the same boiler or turbine to generate power. By adapting or building boilers and turbines to accept multiple fuel sources, they can be co-fired with biomass and waste derived fuels, allowing a reduction in carbon output, thus providing cleaner energy. Fuel flexibility is becoming more important in a world of diminishing fossil fuel stocks. Many countries are investing in the development of more efficient fuel flexible boilers and turbines, and their use is becoming more prevalent in industry as well. This book provides comprehensive coverage of flexible fuel energy generation across all potential fuel types, and was written by a selection of experts in the field who discuss the types of fuels which can be used in fuel flexible energy generation, from solid fuels to biomass fuels, the preparation of fuels to be used in fuel flexible operations, that includes their handling and transport, and combustion and conversion technologies with chapters ranging from large-scale coal gasification to technology options and plant design issues.
    • Environmental and Health Issues in Unconventional Oil and Gas Development

      • 1st Edition
      • Debra A Kaden + 1 more
      • English
      Environmental and Health Issues in Unconventional Oil and Gas Development offers a series of authoritative perspectives from varied viewpoints on key issues relevant in the use of directional drilling and hydraulic fracturing, providing a timely presentation of requisite information on the implications of these technologies for those connected to unconventional oil and shale gas development. Utilizing expertise from a range of contributors in academia, non-governmental organizations, and the oil and gas industry, Environmental and Health Issues in Unconventional Oil and Gas Development is an essential resource for academics and professionals in the oil and gas, environmental, and health and safety industries as well as for policy makers.
    • Security Controls Evaluation, Testing, and Assessment Handbook

      • 1st Edition
      • Leighton Johnson
      • English
      Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
    • Building Intelligent Information Systems Software

      Introducing the Unit Modeler Development Technology
      • 1st Edition
      • Thomas D. Feigenbaum
      • English
      Building Intelligent Information Systems Software shows scientists and engineers how to build applications that model complex information, data, and knowledge without the need for coding. Traditional software development takes time and leads to inflexible, complicated applications that almost, but don’t exactly, meet the intended needs. Requirements can change, sometimes mid-development, and adapting existing systems can be difficult. Individual solutions can be incompatible, leading to information silos and inefficiency throughout an organization. This book offers a solution – the Information Unit Model, an innovative architecture for translating domain knowledge into applications. By encapsulating the complexities of computing, the Unit Model allows engineers to focus on business or experimental needs. Author Tom Feigenbaum, inventor of the Unit Modeler, demonstrates this innovative software architecture for rapid application design and development. His approach promotes repurposing pre-existing tools and libraries, and collaborating across the cloud, to promote information sharing and efficient development practices. Each concept is illustrated with examples including file management, data management, and 3D visualization.