51leF4waN2L._SX218_BO1,204,203,200_QL40_
PDF
Cloud Security and Privacy: (Theory in Practice)

Cloud computing is such a hot topic in today's IT world. The business reasons for adopting cloud computing to run SMB and enterprise IT operations is so strong that it is almost inevitable that we will see a movement toward more and more cloud services being offered. Perhaps a dark cloud that hangs over cloud computing is the question of security (and privacy). The authors of "Cloud Security and Privacy" have done an excellend job of...

004cb3d2_medium
PDF
LDPC Code Designs, Constructions, and Unification

'The importance of LDPC codes in numerous applications and their capacity-approaching performance has led to an explosion in research into their construction and analysis over the past decade. The numerous effective constructions of them can be broadly classified as algebraic and graphical, including the important superposition, protograph and spatial coupling techniques. This timely volume explains, unifies and greatly clarifies the...

51VxGAayVqL._SY291_BO1,204,203,200_QL40_
PDF
Principles and Practices for a Federal Statistical Agency

Publicly available statistics from government agencies that are credible, relevant, accurate, and timely are essential for policy makers, individuals, households, businesses, academic institutions, and other organizations to make informed decisions. Even more, the effective operation of a democratic system of government depends on the unhindered flow of statistical information to its citizens. In the United States, federal statistica...

51L1dZXSoML._SY291_BO1,204,203,200_QL40_
PDF
Combating Security Breaches and Criminal Activity in the Digital Sphere

With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques ...

51F6+1QGRRL._SX331_BO1,204,203,200_
PDF
Full Disclosure: The Perils and Promise of Transparency

Sunshine may indeed be the best disinfectant, in Louis Brandeis' words, but only if we know when, where, and how to shine the light. That is exactly the task that Full Disclosure sets itself. This is an important book at an important time, for everyone from mayors to senators to secretary generals."   "Governmental transparency efforts inform the public about additives in the food we eat, dangerous criminals in our neighborhoods...

004ea606_medium
PDF
Series 7 Exam Practice Questions

This 129 page workbook contains 2 full-length practice tests for the Series 7 (250 questions each test), with each being followed by an explanations and answers section that addresses each question. The quality of this prep material may only be weighed once I take the test, but given my background as a teacher, I can see great value in the "test then explain" method. There is a great deal of psychology to support the value of pre-tes...

5169NjWSvmL._SX330_BO1,204,203,200_
PDF
Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities

"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"-- Maximiliano E. Korstanje is editor in chief of International Journal of Safety and Security in Tourism...

516eJbbWKxL._SY291_BO1,204,203,200_QL40_
PDF
Improving Information Security Practices Through Computational Intelligence

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence prese...

5c88ab4d9c2fd.jpg
PDF
Freedom From Fear, Freedom From Want

Adopting an interdisciplinary perspective, Freedom from Fear, Freedom from Want is a brief introduction to human security, conflict, and development. The book analyzes such key human security issues as climate change, crimes against humanity, humanitarian intervention, international law, poverty, terrorism, and transnational crime, among others. The authors encourage readers to critically assess emerging threats while evaluating pote...

5c78dfc1b8b6d.jpg
PDF
Privileged Attack Vectors

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges. In decades past, an en...