Skip to main content

Books in Social sciences and humanities

  • Handbook of Management Accounting Research

    • 1st Edition
    • Volume 3
    • Anthony G. Hopwood + 2 more
    • English
    Volume one of Handbook of Management Accounting Research sets the context for all three volumes in the series. Volume two provides insights into research on different management accounting practices. This third and final volume features contributions from some of the most influential researchers in various areas of management accounting research, consolidates the content of volumes one and two, and concludes with examples of management accounting research from around the world.
  • Disappearing Cryptography

    Information Hiding: Steganography and Watermarking
    • 3rd Edition
    • Peter Wayner
    • English
    Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
  • Virtualization for Security

    Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
    • 1st Edition
    • John Hoopes
    • English
    One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives. Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.About the TechnologiesA sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.Virtualiz... has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.A honeypot is a system that looks and acts like a production environment but is actually a monitored trap, deployed in a network with enough interesting data to attract hackers, but created to log their activity and keep them from causing damage to the actual production environment. A honeypot exposes new threats, tools, and techniques used by hackers before they can attack the real systems, which security managers patch based on the information gathered. Before virtualization became mainstream, setting up a machine or a whole network (a honeynet) for research purposes only was prohibitive in both cost and time management. Virtualization makes this technique more viable as a realistic approach for companies large and small.
  • Securing Intellectual Property

    Protecting Trade Secrets and Other Information Assets
    • 1st Edition
    • Information Information Security
    • English
    Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
  • Principles of Financial Engineering

    • 2nd Edition
    • Salih N. Neftci
    • English
    Principles of Financial Engineering, Second Edition, is a highly acclaimed text on the fast-paced and complex subject of financial engineering. This updated edition describes the "engineering" elements of financial engineering instead of the mathematics underlying it. It shows you how to use financial tools to accomplish a goal rather than describing the tools themselves. It lays emphasis on the engineering aspects of derivatives (how to create them) rather than their pricing (how they act) in relation to other instruments, the financial markets, and financial market practices. This volume explains ways to create financial tools and how the tools work together to achieve specific goals. Applications are illustrated using real-world examples. It presents three new chapters on financial engineering in topics ranging from commodity markets to financial engineering applications in hedge fund strategies, correlation swaps, structural models of default, capital structure arbitrage, contingent convertibles, and how to incorporate counterparty risk into derivatives pricing. Poised midway between intuition, actual events, and financial mathematics, this book can be used to solve problems in risk management, taxation, regulation, and above all, pricing. This latest edition of Principles of Financial Engineering is ideal for financial engineers, quantitative analysts in banks and investment houses, and other financial industry professionals. It is also highly recommended to graduate students in financial engineering and financial mathematics programs.
  • Strategic Marketing Decision-Making within Japanese and South Korean Companies

    • 1st Edition
    • Yang-Im Lee + 1 more
    • English
    This book acts as a bridge between marketing and strategic management, as it is written from a strategic marketing perspective. It provides students and practising managers with an appreciation and an understanding of how managers in Japanese and South Korean companies formulate and implement strategic marketing decisions, how they embrace the organizational learning concept, and how they formulate working relationships with staff in partner organizations. It provides an explanation of the role that culture plays in the management process and various problems are cited in the text and solutions are offered that reinforce the theories and concepts covered. A number of case studies highlight the link between theory and practice, and the work is structured in a way that allows the reader to think through and reflect upon the key issues associated with decision-making within Japanese and South Korean companies.
  • Practical Aviation Security

    Predicting and Preventing Future Threats
    • 1st Edition
    • Jeffrey Price + 1 more
    • English
    Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events, to the policies and policy makers and the major terrorist and criminal acts that have shaped the procedures in use today, to the tip-of-the-spear technologies that are shaping the future. This text enables the reader to enter airport security or other aviation management roles with the proper knowledge to immediately implement the necessary security programs, to meet international guidelines and to responsibly protect their facility or organization, no matter how large or small. Using case studies and practical security measures in use at airports all over the world, readers learn the effective methods and the fundamental principles involved in designing and implementing a security system. This text covers commercial airport security, general aviation and cargo operations, threats and threat detection and response systems as well as international security issues. While not perfect, the aviation security system is comprehensive and requires continual focus and attention to be able to stay a step ahead of the next attack. This text provides the tools necessary to prepare practitioners to enter the industry, and if they are already in the industry to better understand it so they can prevent the next tragedy.
  • International Review of Research in Mental Retardation

    • 1st Edition
    • Volume 36
    • English
    International Review of Research in Mental Retardation is an ongoing scholarly look at research into the causes, effects, classification systems, syndromes, etc. of mental retardation. Contributors come from wide-ranging perspectives, including genetics, psychology, education, and other health and behavioral sciences. Volume 36 of the series offers chapters on newborn screening for intellectual disability; responsive parenting; Trisomy 21; Alzheimer’s disease in adults with Down Syndrome; foolish action in adults with intellectual disabilities; animal models of self-injurious behavior; theoretical and methodological issues in sibling research; understanding individual differences in adaptation in parents of children with intellectual disabilitie; and “What Do You Think If . . . “ using vignettes to study attitudes toward adult sibling caregiving and competence of parents of children with disabilities.The wide range of topics covered in these chapters make Volume 36 of the International Review of Research in Mental Retardation a particularly valuable resource for academic researchers in developmental and cognitive psychology, as well as those in neuropsychology.
  • Nokia Firewall, VPN, and IPSO Configuration Guide

    • 1st Edition
    • Andrew Hay + 2 more
    • English
    "While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."--Chri... Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.
  • Next Generation SSH2 Implementation

    Securing Data in Motion
    • 1st Edition
    • Dale Liu
    • English
    New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA... SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.