|
|
Books > Computing & IT
As human activities moved to the digital domain, so did all the
well-known malicious behaviors including fraud, theft, and other
trickery. There is no silver bullet, and each security threat calls
for a specific answer. One specific threat is that applications
accept malformed inputs, and in many cases it is possible to craft
inputs that let an intruder take full control over the target
computer system. The nature of systems programming languages lies
at the heart of the problem. Rather than rewriting decades of
well-tested functionality, this book examines ways to live with the
(programming) sins of the past while shoring up security in the
most efficient manner possible. We explore a range of different
options, each making significant progress towards securing legacy
programs from malicious inputs. The solutions explored include
enforcement-type defenses, which excludes certain program
executions because they never arise during normal operation.
Another strand explores the idea of presenting adversaries with a
moving target that unpredictably changes its attack surface thanks
to randomization. We also cover tandem execution ideas where the
compromise of one executing clone causes it to diverge from another
thus revealing adversarial activities. The main purpose of this
book is to provide readers with some of the most influential works
on run-time exploits and defenses. We hope that the material in
this book will inspire readers and generate new ideas and
paradigms.
The development of new and effective analytical and numerical
models is essential to understanding the performance of a variety
of structures. As computational methods continue to advance, so too
do their applications in structural performance modeling and
analysis. Modeling and Simulation Techniques in Structural
Engineering presents emerging research on computational techniques
and applications within the field of structural engineering. This
timely publication features practical applications as well as new
research insights and is ideally designed for use by engineers, IT
professionals, researchers, and graduate-level students.
The highly dynamic world of information technology service
management stresses the benefits of the quick and correct
implementation of IT services. A disciplined approach relies on a
separate set of assumptions and principles as an agile approach,
both of which have complicated implementation processes as well as
copious benefits. Combining these two approaches to enhance the
effectiveness of each, while difficult, can yield exceptional
dividends. Balancing Agile and Disciplined Engineering and
Management Approaches for IT Services and Software Products is an
essential publication that focuses on clarifying theoretical
foundations of balanced design methods with conceptual frameworks
and empirical cases. Highlighting a broad range of topics including
business trends, IT service, and software development, this book is
ideally designed for software engineers, software developers,
programmers, information technology professionals, researchers,
academicians, and students.
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
The WWW era made billions of people dramatically dependent on the
progress of data technologies, out of which Internet search and Big
Data are arguably the most notable. Structured Search paradigm
connects them via a fundamental concept of key-objects evolving out
of keywords as the units of search. The key-object data model and
KeySQL revamp the data independence principle making it applicable
for Big Data and complement NoSQL with full-blown structured
querying functionality. The ultimate goal is extracting Big
Information from the Big Data. As a Big Data Consultant, Mikhail
Gilula combines academic background with 20 years of industry
experience in the database and data warehousing technologies
working as a Sr. Data Architect for Teradata, Alcatel-Lucent, and
PayPal, among others. He has authored three books, including The
Set Model for Database and Information Systems and holds four US
Patents in Structured Search and Data Integration.
Mathematics has been used as a tool in logistical reasoning for
centuries. Examining how specific mathematic structures can aid in
data and knowledge management helps determine how to efficiently
and effectively process more information in these fields. N-ary
Relations for Logical Analysis of Data and Knowledge is a critical
scholarly reference source that provides a detailed study of the
mathematical techniques currently involved in the progression of
information technology fields. Featuring relevant topics that
include algebraic sets, deductive analysis, defeasible reasoning,
and probabilistic modeling, this publication is ideal for
academicians, students, and researchers who are interested in
staying apprised of the latest research in the information
technology field.
The effective application of knowledge management principles has
proven to be beneficial for modern organizations. When utilized in
the academic community, these frameworks can enhance the value and
quality of research initiatives. Enhancing Academic Research With
Knowledge Management Principles is a pivotal reference source for
the latest research on implementing theoretical frameworks of
information management in the context of academia and universities.
Featuring extensive coverage on relevant areas such as data mining,
organizational and academic culture, this publication is an ideal
resource for researchers, academics, practitioners, professionals,
and students.
Machine Learning is evolving computation and its application like
never before. It is now widely recognized that machine learning is
playing a similar role as electricity played in modernizing the
world. From simple high school science projects to large-scale
radio astronomy, machine learning has revolutionized it all.
However, a few of the applications stand out as transforming the
world and opening up a new era. The book intends to showcase
applications of machine learning that are leading us to the next
generation of computing and living standards. The book portrays the
application of machine learning to cutting-edge technologies that
are playing a prominent role in improving the quality of life and
the progress of civilization. The focus of the book is not just
machine learning, but its application to specific domains that are
resulting in substantial progress of civilization. It is ideal for
scientists and researchers, academic and corporate libraries,
students, lecturers and teachers, and practitioners and
professionals.
In recent years, technological advances have led to significant
developments within a variety of business applications. In
particular, data-driven research provides ample opportunity for
enterprise growth, if utilized efficiently. Privacy and Security
Policies in Big Data is a pivotal reference source for the latest
research on innovative concepts on the management of security and
privacy analytics within big data. Featuring extensive coverage on
relevant areas such as kinetic knowledge, cognitive analytics, and
parallel computing, this publication is an ideal resource for
professionals, researchers, academicians, advanced-level students,
and technology developers in the field of big data.
|
|