Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security a...
详细信息
ISBN:
(数字)9780124072077
ISBN:
(纸本)9780124071896
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick *** about Internet authenticationLearn about federated authenticationLearn about ADFS 2
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, ...
详细信息
ISBN:
(数字)9781597499521
ISBN:
(纸本)9781597499477
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practices as well as specific tricks the authors employ in their roles as database administrators for some of the largest SQL server deployments in the world. "Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."--Buck Woody, Senior technology Specialist, MicrosoftPresents hands-on techniques for protecting your SQL Server database from intrusion and attackProvides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali)Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs
Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the metho...
详细信息
ISBN:
(数字)9780124095359
ISBN:
(纸本)0124095054;9780124095052
Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increase...
详细信息
ISBN:
(数字)9780128023549
ISBN:
(纸本)9780128021224
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid *** the most current and leading edge research on Smart Grid security from a holistic standpoint, featuring a panel of top experts in the *** coverage of risk management, operational security, and secure development of the Smart *** key technical topics, including threat types and attack vectors, threat case studies, smart metering, smart home, e- mobility, smart buildings, DERs, demand response management, distribution grid operators, transmission grid operators, virtual power plant
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb d...
详细信息
ISBN:
(数字)9780124078833
ISBN:
(纸本)9780124077492
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. Youl learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information *** detailed explanations of the complete penetration testing lifecycleComplete linkage of the Kali information, resources and distribution downloadsHands-on exercises reinforce topics
Newly updated with over 150 pages of material on the latest Tcl extensions, Tcl/Tk: A Developer Guide is a unique practical tutorial for professional programmers and beginners alike. Starting with a clear picture of t...
详细信息
ISBN:
(数字)9780123847188
ISBN:
(纸本)9780123847171
Newly updated with over 150 pages of material on the latest Tcl extensions, Tcl/Tk: A Developer Guide is a unique practical tutorial for professional programmers and beginners alike. Starting with a clear picture of the basics, Tcl/Tk covers the variety of tools in this "Swiss army knife" of programming languages, giving you the ability to enhance your programs, extend your application's capabilities, and become a more effective programmer. This updated edition covers all of the new features of version 8.6, including object-oriented programming and the creation of megawidgets, existing data structure implementations, themed widgets and virtual events. Extensive code snippets and online tutorials in various languages will give you a firm grasp on how to use the Tcl/Tk libraries and interpreters and, most importantly, on what constitutes an effective strategy for using Tcl/Tk. Includes the latest features of Tcl/Tk 8.6Covers Tcl development tools, popular extensions, and packages to allow developers to solve real-world problems with Tcl/Tk immediatelyProvides straightforward explanations for beginners and offers tips, style guidelines, and debugging techniques for advanced users
High Speed Digital Design discusses the major factors to consider in designing a high speed digital system and how design concepts affect the functionality of the system as a whole. It will help you understand why sig...
详细信息
ISBN:
(数字)9780124186675
ISBN:
(纸本)9780124186637
High Speed Digital Design discusses the major factors to consider in designing a high speed digital system and how design concepts affect the functionality of the system as a whole. It will help you understand why signals act so differently on a high speed digital system, identify the various problems that may occur in the design, and research solutions to minimize their impact and address their root causes. The authors offer a strong foundation that will help you get high speed digital system designs right the first time. Taking a systems design approach, High Speed Digital Design offers a progression from fundamental to advanced concepts, starting with transmission line theory, covering core concepts as well as recent developments. It then covers the challenges of signal and power integrity, offers guidelines for channel modeling, and optimizing link circuits. Tying together concepts presented throughout the book, the authors present Intel processors and chipsets as real-world design *** knowledge and guidance in the design of high speed digital circuitsExplores the latest developments in system designCovers everything that encompasses a successful printed circuit board (PCB) productOffers insight from Intel insiders about real-world high speed digital design
Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online social networks and the mechanisms underpinning human online social b...
详细信息
ISBN:
(数字)9780128030424
ISBN:
(纸本)9780128030233
Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online social networks and the mechanisms underpinning human online social behavior. As the availability of digital communication data generated by social media is revolutionizing the field of social networks analysis, the text discusses the use of large- scale datasets to study the structural properties of online ego networks, to compare them with the properties of general human social networks, and to highlight additional properties. Users will find the data collected and conclusions drawn useful during design or research service initiatives that involve online and mobile social network *** an analysis of the structural properties of ego networks in online social networks Presents quantitative evidence of the Dunbar number in online environmentsDiscusses original structural and dynamic properties of human social network through OSN analysis
Everything you know about the future is wrong. Presumptive Design: Design Provocations for Innovation is for people inventing the future: future products, services, companies, strategies and policies. It introduces a...
详细信息
ISBN:
(数字)9780128030875
ISBN:
(纸本)9780128030868
Everything you know about the future is wrong. Presumptive Design: Design Provocations for Innovation is for people inventing the future: future products, services, companies, strategies and policies. It introduces a design-research method that shortens time to insights from months to days. Presumptive Design is a fundamentally agile approach to identifying your audiences?key needs. Offering rapidly crafted artifacts, your teams collaborate with your customers to identify preferred and profitable elements of your desired outcome. Presumptive Design focuses on your users?problem space, informing your business strategy, your project early stage definition, and your innovation pipeline. Comprising discussions of design theory with case studies and how-to, the book offers business leadership, management and innovators the benefits of design thinking and user experience in the context of early stage problem definition. Presumptive Design is an advanced technique and quick to use: within days of reading this book, your research and design teams can apply the approach to capture a risk-reduced view of your *** actionable approaches to inform strategy and problem definition through design thinkingOffers a design-based research method to complement existing market, ethnographic and customer research methodsDemonstrates a powerful technique for identifying disruptive innovation early in the innovation pipeline by putting customers firstPresents each concept with case studies and exploration of risk factors involved including warnings for situations in which the technique can be misapplied
In the commissioning or quality assurance of a medical linear accelerator or a computerized radiotherapy planning system, the traditional approach usually consists of acquiring and comparing one-dimensional dose profi...
详细信息
In the commissioning or quality assurance of a medical linear accelerator or a computerized radiotherapy planning system, the traditional approach usually consists of acquiring and comparing one-dimensional dose profiles. This methodology is tedious and incomplete since only a portion of the radiation field can realistically be sampled. We have developed an automated measurement system which allows efficient measurement and display a complete two-dimensional dose distributions. The general purpose microcomputer used (IBM PC/XT compatible) can be interfaced economically to any water phantom dosimetry system equipped with a three axis scancontroller, and can also communicate data to the treatment planning system. This allows for direct comparison of measured with computed dose distributions, thus revealing discrepancies in the dose computation algorithms used. In this paper, we describe the interface between the microcomputer, a conventional water dosimetry system (Therados RFA-3), and a treatment planning computer. We report our early experience with acquiring dose distributions and show sample comparisons with computed results for megavoltage electron beams incident on homogeneous and heterogeneous systems.
暂无评论