Skip to main content

Books in Social sciences and humanities

    • The Evidence and Impact of Financial Globalization

      • 1st Edition
      • November 27, 2012
      • Gerard Caprio
      • English
      • Hardback
        9 7 8 0 1 2 3 9 7 8 7 4 5
      • eBook
        9 7 8 0 1 2 4 0 5 8 9 9 6
      The sharp realities of financial globalization become clear during crises, when winners and losers emerge. Crises usher in short- and long-term changes to the status quo, and everyone agrees that learning from crises is a top priority. The Evidence and Impact of Financial Globalization devotes separate articles to specific crises, the conditions that cause them, and the longstanding arrangements devised to address them. While other books and journal articles treat these subjects in isolation, this volume presents a wide-ranging, consistent, yet varied specificity. Substantial, authoritative, and useful, these articles provide material unavailable elsewhere.
    • Federal Cloud Computing

      • 1st Edition
      • November 27, 2012
      • Matthew Metheny
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 7 3 9 8
      Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.
    • FISMA and the Risk Management Framework

      • 1st Edition
      • November 27, 2012
      • Daniel R. Philpott + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 1 4
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 2 1
      FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems.
    • Quantitative Data Processing in Scanning Probe Microscopy

      • 1st Edition
      • November 19, 2012
      • Petr Klapetek
      • English
      • Hardback
        9 7 8 1 4 5 5 7 3 0 5 8 2
      • eBook
        9 7 8 1 4 5 5 7 3 0 5 9 9
      Accurate measurement at the nano-scale – nanometrology – is a critical tool for advanced nanotechnology applications, where exact quantities and engineering precision are beyond the capabilities of traditional measuring techniques and instruments. Scanning Probe Microscopy (SPM) builds up a picture of a specimen by scanning with a physical probe; unrestrained by the wavelength of light or electrons, the resolution obtainable with this technique can resolve atoms. SPM instruments include the Atomic Force Microscope (AFM) and Scanning Tunneling Microscope (STM). Despite tremendous advances in Scanning Probe Microscopy (SPM) over the last twenty years, its potential as a quantitative measurement tool have not been fully realized, due to challenges such as the complexity of tip/sample interaction. In this book, Petr Klapetek uses the latest research to unlock SPM as a toolkit for nanometrology in fields as diverse as nanotechnology, surface physics, materials engineering, thin film optics, and life sciences. Klapetek's considerable experience of Quantitive Data Processing, using software tools, enables him to not only explain the microscopy techniques, but also to demystify the analysis and interpretation of the data collected. In addition to the essential principles and theory of SPM metrology, Klapetek provides readers with a number of worked examples to demonstrate typical ways of solving problems in SPM analysis. Source data for the examples as well as most of the described open source software tools are available on a companion website.
    • Augmented Reality

      • 1st Edition
      • November 19, 2012
      • Joseph Rampolla + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 7 3 3 6
      • eBook
        9 7 8 1 5 9 7 4 9 7 3 4 3
      With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality. In this cutting-edge book, the authors outline and discuss never-before-publish... information about augmented reality and its capabilities. With coverage of mobile, desktop, developers, security, challenges, and gaming, this book gives you a comprehensive understanding of what augmented reality is, what it can do, what is in store for the future and most importantly: how to benefit from using AR in our lives and careers.
    • Handbooks in Financial Globalization

      • 1st Edition
      • November 16, 2012
      • Gerard Caprio
      • English
      • Hardback
        9 7 8 0 1 2 4 0 7 2 2 6 8
      • eBook
        9 7 8 0 1 2 4 1 6 7 2 0 9
      These three volumes present the full complexity of the history, practices, and outlook of 21st century global financial integration. The Handbook of Key Global Financial Markets, Institutions, and Infrastructure explores the growth of markets, intermediaries, rights, practices, and standards worldwide. The Evidence and Impact of Financial Globalization devotes separate articles to specific crises, the conditions that cause them, and the longstanding arrangements devised to address them. The Handbook of Safeguarding Global Financial Stability examines our political economy, particularly the ways in which formal and informal policies as well as financial theories and technical models inhabit our institutions, strategies, and tactics. For those seeking substantial, authoritative descriptions and summaries, these volumes will replace books, journals, and other information sources with a coherent, easy-to-use reference work.
    • The Basics of Cyber Warfare

      • 1st Edition
      • November 16, 2012
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 7 3 7 2
      • eBook
        9 7 8 0 1 2 4 0 5 1 8 1 2
      The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
    • Handbook of Computable General Equilibrium Modeling

      • 1st Edition
      • Volume 1A
      • November 14, 2012
      • Peter B. Dixon + 1 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 3 6 3 4 1
      • eBook
        9 7 8 0 4 4 4 5 3 6 3 5 8
      In this collection of 17 articles, top scholars synthesize and analyze scholarship on this widely used tool of policy analysis, setting forth its accomplishments, difficulties, and means of implementation. Though CGE modeling does not play a prominent role in top US graduate schools, it is employed universally in the development of economic policy. This collection is particularly important because it presents a history of modeling applications and examines competing points of view.
    • Handbook of Computable General Equilibrium Modeling

      • 1st Edition
      • Volume 1B
      • November 14, 2012
      • Peter B. Dixon + 1 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 9 5 5 6 0
      • eBook
        9 7 8 0 4 4 4 5 9 5 8 0 5
      In this collection of 16 articles, top scholars synthesize and analyze scholarship on this widely used tool of policy analysis, setting forth its accomplishments, difficulties, and means of implementation. Though CGE modeling does not play a prominent role in top US graduate schools, it is employed universally in the development of economic policy. This collection is particularly important because it presents a history of modeling applications and examines competing points of view.
    • Advanced Persistent Threat

      • 1st Edition
      • November 13, 2012
      • Eric Cole
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 4 9 1
      • eBook
        9 7 8 1 5 9 7 4 9 9 5 5 2
      The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.