Skip to main content

Books in Physical sciences and engineering

  • How to Define and Build an Effective Cyber Threat Intelligence Capability

    • 1st Edition
    • December 5, 2014
    • Henry Dalziel
    • Eric Olson + 1 more
    • English
    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
  • How to Attack and Defend Your Website

    • 1st Edition
    • December 5, 2014
    • Henry Dalziel
    • Alejandro Caceres
    • English
    How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.
  • Optimizing IEEE 802.11i Resource and Security Essentials

    For Mobile and Stationary Devices
    • 1st Edition
    • December 5, 2014
    • Iraj Sadegh Amiri + 2 more
    • English
    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.
  • How to Defeat Advanced Malware

    New Tools for Protection and Forensics
    • 1st Edition
    • December 5, 2014
    • Henry Dalziel
    • Simon Crosby
    • English
    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization... The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization...
  • Advances in Batteries for Medium and Large-Scale Energy Storage

    Types and Applications
    • 1st Edition
    • December 5, 2014
    • C Menictas + 2 more
    • English
    As energy produced from renewable sources is increasingly integrated into the electricity grid, interest in energy storage technologies for grid stabilisation is growing. This book reviews advances in battery technologies and applications for medium and large-scale energy storage. Chapters address advances in nickel, sodium and lithium-based batteries. Other chapters review other emerging battery technologies such as metal-air batteries and flow batteries. The final section of the book discuses design considerations and applications of batteries in remote locations and for grid-scale storage.
  • A Machine-Learning Approach to Phishing Detection and Defense

    • 1st Edition
    • December 5, 2014
    • O.A. Akanbi + 2 more
    • English
    Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
  • View-based 3-D Object Retrieval

    • 1st Edition
    • December 4, 2014
    • Yue Gao + 1 more
    • English
    Content-based 3-D object retrieval has attracted extensive attention recently and has applications in a variety of fields, such as, computer-aided design, tele-medicine,mobile multimedia, virtual reality, and entertainment. The development of efficient and effective content-based 3-D object retrieval techniques has enabled the use of fast 3-D reconstruction and model design. Recent technical progress, such as the development of camera technologies, has made it possible to capture the views of 3-D objects. As a result, view-based 3-D object retrieval has become an essential but challenging research topic. View-based 3-D Object Retrieval introduces and discusses the fundamental challenges in view-based 3-D object retrieval, proposes a collection of selected state-of-the-art methods for accomplishing this task developed by the authors, and summarizes recent achievements in view-based 3-D object retrieval. Part I presents an Introduction to View-based 3-D Object Retrieval, Part II discusses View Extraction, Selection, and Representation, Part III provides a deep dive into View-Based 3-D Object Comparison, and Part IV looks at future research and developments including Big Data application and geographical location-based applications.
  • Top-Down Digital VLSI Design

    From Architectures to Gate-Level Circuits and FPGAs
    • 1st Edition
    • December 4, 2014
    • Hubert Kaeslin
    • English
    Top-Down VLSI Design: From Architectures to Gate-Level Circuits and FPGAs represents a unique approach to learning digital design. Developed from more than 20 years teaching circuit design, Doctor Kaeslin’s approach follows the natural VLSI design flow and makes circuit design accessible for professionals with a background in systems engineering or digital signal processing. It begins with hardware architecture and promotes a system-level view, first considering the type of intended application and letting that guide your design choices. Doctor Kaeslin presents modern considerations for handling circuit complexity, throughput, and energy efficiency while preserving functionality. The book focuses on application-specific integrated circuits (ASICs), which along with FPGAs are increasingly used to develop products with applications in telecommunications, IT security, biomedical, automotive, and computer vision industries. Topics include field-programmable logic, algorithms, verification, modeling hardware, synchronous clocking, and more.
  • Natural Products and Cancer Signaling: Isoprenoids, Polyphenols and Flavonoids

    • 1st Edition
    • Volume 36
    • December 3, 2014
    • English
    Natural compounds from a variety of natural resources including plants have emerged as important source of anticancer drug development. This special issue will highlight the significant advance in elucidating mechanisms of action of these natural compounds, focusing especially on isoprenoids and polyphenols/flavonoi...
  • Annual Reports in Computational Chemistry

    • 1st Edition
    • Volume 10
    • December 3, 2014
    • Ralph A. Wheeler
    • English
    Annual Reports in Computational Chemistry provides timely and critical reviews of important topics in computational chemistry as applied to all chemical disciplines. Topics covered include quantum chemistry, molecular mechanics, force fields, chemical education, and applications in academic and industrial settings. Focusing on the most recent literature and advances in the field, each article covers a specific topic of importance to computational chemists.