Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Man...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
United Nations Peace Operations in a Changing Global Order
This open access volume explores how UN peace operations are adapting to four trends in the changing global order: (1) the rebalancing of relations between states of the global North and the global South; (2) the rise of regional organisations as providers of peace; (3) the rise of violent extremism and fundamentalist non-state actors; and (4) incr...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Transformation and Development
This book features various studies on democratization, transformation, political and economic development, and security issues in the Organization for Security and Cooperation in Europe (OSCE) geographical region and beyond. Written by experts and academics in the fields of human rights, security, transformation and development, particularly in pos...
Security Infrastructure Technology for Integrated Utilization of Big Data
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
Security in an Interconnected World
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is sh...
The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
Anonymous Point Collection
This book is a comprehensive, formal treatment of anonymous point collection. The proposed definition does not only provide a strong notion of security and privacy, but also covers features which are important for practical use. An efficient realization is presented and proven to fulfill the proposed definition. The resulting building block is the ...
Security as Code
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code. In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...
Food Price Volatility and Its Implications for Food Security and Policy
This book provides fresh insights into concepts, methods and new research findings on the causes of excessive food price volatility. It also discusses the implications for food security and policy responses to mitigate excessive volatility. The approaches applied by the contributors range from on-the-ground surveys, to panel econometrics and innova...
The Third Sector as a Renewable Resource for Europe
This book provides a critical account of the third sector and its future in Europe. It offers an original conceptualization of the third sector in its European manifestations alongside an overview of its major contours, including its structure, sources of support, and recent trends. It also assesses the impact of this sector in Europe which conside...
Uses of Technology in Lower Secondary Mathematics Education
This topical survey provides an overview of the current state of the art in technology use in mathematics education, including both practice-oriented experiences and research-based evidence, as seen from an international perspective. Three core themes are discussed: Evidence of effectiveness; Digital assessment; and Communication and collaboration....
The Mathematics Education of Prospective Secondary Teachers Around the World
This volume shares and discusses significant new trends and developments in research and practices related to various aspects of preparing prospective secondary mathematics teachers from 2005–2015. It provides both an overview of the current state-of-the-art and outstanding recent research reports from an international perspective. The authors co...
White-Collar Crime in the Shadow Economy
This book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime. It argues that the offenders who are convicted represent only 'the tip of the iceberg' of a much greater problem: because white-collar crime is forced to comp...
International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation–60 Years of IAEA and EURATOM
This book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensio...
Innovation, Economic Development, and Intellectual Property in India and China
This book analyses intellectual property and innovation governance in the development of six key industries in India and China. These industries are reflective of the innovation and economic development of the two economies, or of vital importance to them: the IT Industry, the film industry, the pharmaceutical industry, plant varieties and food sec...
Why Should I Care? Mobile Security for The Rest of Us
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation
This book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and nonproliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. Current challenges are discussed and attempts made to identify possible solutions an...
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
Windows 10 IT Pro Essentials: Support Secrets
That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows." With that knowledge comes a seemingly endle...
Building Secure and Reliable Systems
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
Application Security in .NET Succinctly
Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, mach...
Rational Cybersecurity for Business
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and...
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, intro...
The Role of Smallholder Farms in Food and Nutrition Security
This open book discusses the current role of smallholders in connection with food security and poverty reduction in developing countries. It addresses the opportunities they enjoy, and the constraints they face, by analysing the availability, access to and utilization of production factors.Due to the relevance of smallholder farms, enhancing their ...

1 2 3 ... 34