Skip to main content

Books in Social sciences and humanities

    • Identifying Ignitable Liquids in Fire Debris

      • 1st Edition
      • October 5, 2015
      • Jeanet Hendrikse + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 3 1 6 5
      • eBook
        9 7 8 0 1 2 8 0 4 3 8 7 5
      Identifying Ignitable Liquids in Fire Debris: A Guideline for Forensic Experts discusses and illustrates the characteristics of different ignitable liquid products. This guideline builds on the minimum criteria of the ignitable liquid classes defined in the internationally accepted standard ASTM E1618 Standard Test Method for Ignitable Liquid Residues in Extracts from Fire Debris Samples by Gas Chromatography-Mass Spectrometry. The volume provides information on the origin of the characteristics of these ignitable liquid products and provides a summary of characteristics to demonstrate a positive identification of the particular product class. Topics such as the term ignitable liquid, relevant guidelines for fire debris analysis, production processes of ignitable liquids, fire debris analysis methods, and interferences in fire debris analysis, are briefly discussed as these topics are essential for the understanding of the identification and classification of ignitable liquid residues in fire debris.
    • Maximizing Electronic Resources Management in Libraries

      • 1st Edition
      • November 21, 2015
      • Lenore England + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 4 7 7
      • eBook
        9 7 8 1 7 8 0 6 3 4 2 8 9
      Maximizing Electronic Resources Management in Libraries: Applying Business Process Management examines the use of Business Process Management (BPM) and the ways it can be beneficially applied to electronic resources management (ERM) to help organize processes in libraries. The book offers librarians a skillset that will make them ready for a variety of library environments. It focuses on the organizational tools offered by BPM, including key elements of ERM functions that lay the groundwork for the present and future use of ERM, and how they will drive methods by which libraries provide access to resources. BPM theories are then reviewed, along with a discussion of present applications of BPM to ERM and a final look at possibilities for future applications.
    • Digital Forensics

      • 1st Edition
      • December 7, 2015
      • John Sammons
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 5 2 6 8
      • eBook
        9 7 8 0 1 2 8 0 4 5 4 2 8
      Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.
    • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 8 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 5 4
      Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.
    • Cyber Security Awareness for CEOs and Management

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 4 5
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 0 8
      Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • Tethered Money

      • 1st Edition
      • July 14, 2015
      • Gideon Samid
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 4 7 7 4
      • eBook
        9 7 8 0 1 2 8 0 3 4 9 7 2
      Tettered Money: Managing Digital Currency Transactions presents a comprehensive discussion of financial transactions using digital currencies, with the author, Gideon Samid, making the case for their expansion in tethered money. Exploring the technical, legal, and historical aspects of digital money, the author discusses how the emerging technology of money specified for a specific need or to perform a particular task will affect society. The ability to dictate, Samid argues, how money is spent could increase control over our lives and resources, enabling us to practice a certain efficiency that would, in due time, become a pillar of civilization. Informative and thought-provoking, the book describes an evolving future that, in some quarters, has already arrived.
    • Securing Social Media in the Enterprise

      • 1st Edition
      • August 11, 2015
      • Henry Dalziel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 1 8 0 2
      • eBook
        9 7 8 0 1 2 8 0 4 1 9 6 3
      Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
    • Practical Deployment of Cisco Identity Services Engine (ISE)

      • 1st Edition
      • November 12, 2015
      • Andy Richter + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 5 7 5
      • eBook
        9 7 8 0 1 2 8 0 4 5 0 4 6
      With the proliferation of mobile devices and bring-your-own-devic... (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
    • Next Generation Red Teaming

      • 1st Edition
      • August 10, 2015
      • Henry Dalziel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 1 7 1 0
      • eBook
        9 7 8 0 1 2 8 0 4 1 8 6 4
      Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.
    • Theoretical and Experimental Methods for Defending Against DDoS Attacks

      • 1st Edition
      • November 10, 2015
      • Iraj Sadegh Amiri + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 3 9 1 1
      • eBook
        9 7 8 0 1 2 8 0 5 3 9 9 7
      Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.