Компьютеры: прочее

Различные книги в жанре Компьютеры: прочее

Cryptology Unlocked

Reinhard Wobst

Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code-breaking and attack algorithms. Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way. Join the cryptology adventure, and understand: The difference between good and bad algorithms Whether or not secret services can read all messages The real-world affect cryptography had on World War II The unspoken security risks behind digital mobile standards GSM and UMTS The everyday implications on digital signatures, PINs and online banking

Applied Cryptanalysis

Mark Stamp

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

Secrets and Lies

Группа авторов

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can't do in achieving digital security

Information Security Governance

Группа авторов

The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that is critical to organizational success and survival. Written by an industry expert, Information Security Governance is the first book-length treatment of this important topic, providing readers with a step-by-step approach to developing and managing an effective information security program. Beginning with a general overview of governance, the book covers: The business case for information security Defining roles and responsibilities Developing strategic metrics Determining information security outcomes Setting security governance objectives Establishing risk management objectives Developing a cost-effective security strategy A sample strategy development The steps for implementing an effective strategy Developing meaningful security program development metrics Designing relevant information security management metrics Defining incident management and response metrics Complemented with action plans and sample policies that demonstrate to readers how to put these ideas into practice, Information Security Governance is indispensable reading for any professional who is involved in information security and assurance.

Virtual Reality and Augmented Reality

Guillaume Moreau

Virtual and Augmented Reality have existed for a long time but were stuck to the research world or to some large manufacturing companies. With the appearance of low-cost devices, it is expected a number of new applications, including for the general audience. This book aims at making a statement about those novelties as well as distinguishing them from the complexes challenges they raise by proposing real use cases, replacing those recent evolutions through the VR/AR dynamic and by providing some perspective for the years to come.

Office 365 in Business

David Kroenke

Discover the Office option every business can afford Now your business can benefit from sophisticated communication and collaboration services fully integrated with Microsoft Office products. Once limited to companies large enough to afford data centers and the expensive IT staff to support them, these services can now be yours, and this book shows you how. Each chapter begins with a common business problem you've most likely faced, followed by the Office 365 solution. You'll learn to share documents, secure your communications, manage and share calendars and tasks, conduct video meetings, and give your business the edge it deserves. Teaches you how your business, large or small, can benefit from Office 365 Explains how to take advantage of Exchange Online, Lync Online, and SharePoint Online Shows you what makes Office 365 so affordable and why it doesn't require an IT staff Highlights what constitutes successful collaboration and how to facilitate it Explores specific Office 365 solutions for familiar business issues Addresses how to conduct video conferences, schedule meetings, set up discussions, and make remote PowerPoint presentations with Office 365 With this book, you'll discover how Office 365 can benefit your business every day of the year!

Hacking Point of Sale

Группа авторов

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

Computer Security and Cryptography

Группа авторов

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work. Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications. Three basic types of chapters are featured to facilitate learning: Chapters that develop technical skills Chapters that describe a cryptosystem and present a method of analysis Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

FlowingData.com Data Visualization Set

Nathan Yau

Visualize This is a guide on how to visualize and tell stories with data, providing practical design tips complemented with step-by-step tutorials. It begins with a description of the huge growth of data and visualization in industry, news, and gov't and opportunities for those who tell stories with data. Logically it moves on to actual stories in data-statistical ones with trends and human stories. the technical part comes up quickly with how to gather, parse and format data with Python, R, Excel, Google docs, etc and details tools to visualize data-native graphics for the Web like ActionScript, Flash libraries, PHP, JavaScript, CSS, HTML. Every chapter provides an example as well. Patterns over time and kinds of data charts are followed by proportions, chart types and examples. Next, examples and descriptions of outliers and how to show them, different kinds of maps, how to guide your readers and explain the data «in the visualization». The book ends with a value-add appendix on graphical perception. Data Points focuses on the approach to visualization and data. Visualization is a medium that can be used as a tool, art, a way to tell stories, etc., Data Points guides readers through making data approachable through visualization techniques and best practices. The focus is on designing with a purpose in mind. Data Points discusses why recipes (from the rules) work and expands on how readers can make their own recipes. The book is example-driven, featuring work from people in areas of art, design, business, statistics, computer science, cartography, and online media, as well as many of the author's own illustrations. The major sections of the book cover: Visualization as Medium – In the same way not all movies are documentaries, not all visualization is about optimal visual perception. Data Representation – There are rules across all visualization applications, such as the use of appropriate shapes to accurately represent values. Design with Purpose – Rules can be broken though. It all depends on who and what you're designing for. Data Points digs deep into the foundations of data visualization: Understanding Data and Visualization Representing Data Exploring Data Visually Designing for an Audience Visualizing with Clarity Putting Everything Into Practice with Tools and Resources

Canon EOS 6D Digital Field Guide

Michael Corsentino

The Canon EOS 6D is Canon's smallest and lightest full-frame DSLR camera to date and boasts an extensive feature set. This full-color, portable guide goes beyond the owner's manual to deliver clear, succinct descriptions of how these features and functions work and explains how they affect the resulting photos. With the expert advice and clear instructions, the Canon EOS 6D Digital Field Guide makes this sophisticated camera accessible to even first-time DSLR users Helps you to consistently achieve professional-level photography using the Canon EOS 6D Walks you through the essential controls, features, and functions using step-by-step instructions and providing full-color images of each menu screen Shows you how to get the exact shots you want, when you want them, and is packed with beautiful color photos Shoot in Live View, choose the best settings for movie-making, and learn how to share your images and video online via the built-in Wi-Fi Includes step-by-step techniques and professional tips on taking exceptional photos with your Canon EOS 6D Canon EOS 6D Digital Field Guide is packed with so much helpful advice for getting the most out of your Canon EOS 6D, you'll find yourself referencing it again and again