![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Social & legal aspects of computing
Implement the powerful multimedia and interactive capabilities offered by HTML5, including style control tools, illustration tools, video, audio, and rich media solutions. Understand how HTML5 is changing the web development game with this project-based book that shows you-not just tells you-what HTML5 can do for your websites. Reinforce your practical understanding of the new standard with demo applications and tutorials, so that execution is one short step away. HTML5 is the future of the web. Literally every web designer and developer needs to know how to use this language to create the types of web sites consumers now expect. This new edition of the bestseller teaches you to enhance your web designs with rich media solutions and interactivity, using detailed descriptions and hands-on projects for every step along the way. The second edition contains completely updated information, including more on mobility and video standards, plus new projects.The companion website, visualizetheweb.com, is packed full of extra information, online code libraries, and a user forum, offering even more opportunity to learn new skills, practice your coding and interact with other users.
This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.
Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits
This book, originally published in 1992, encapsulates ten years of research at the Open University's Human Cognition Research Laboratory. The research investigates the problems of novice programmers, and is strongly oriented toward the design and implementation of "programming environments" aimed at eliminating or easing novices' problems. A range of languages is studied: Pascal, SOLO, Lisp, Prolog and "Knowledge Engineering Programming". The primary emphasis of the empirical studies is to gain some understanding of novices' "mental models" of the inner workings of computers. Such (erroneous) models are constructed by novices in their own heads to account for the idiosyncrasies of particular programming languages. The primary emphasis of the implementations described in the book is the provision of "automatic debugging aids", i.e. artificial intelligence programs which can analyse novices' buggy programs, and make sense of them, thereby providing useful advice for the novices. Another related strand taken in some of the work is the concept of "pre-emptive design", i.e. the provision of tools such as syntax-directed editors and graphical tracers which help programmers avoid many frequently-occurring errors. A common thread throughout the book is its Cognitive Science/Artificial Intelligence orientation. AI tools are used, for instance, to construct simulation models of subjects writing programs, in order to provide insights into what their deep conceptual errors are. At the other extreme, AI programs which were developed in order to help student debug their programs are observed empirically in order to ensure that they provide facilities actually needed by real programmers. This book will be of great interest to advanced undergraduate, postgraduate, and professional researchers in Cognitive Science, Artificial Intelligence, and Human-Computer Interaction.
"User Interfaces for All" is the first book dedicated to the issues
of Universal Design and Universal Access in the field of
Human-Computer Interaction (HCI). Universal Design (or Design for
All) is an inclusive and proactive approach seeking to accommodate
diversity in the users and usage contexts of interactive products,
applications, and services, starting from the design phase of the
development life cycle. The ongoing paradigm shift toward a
knowledge-intensive information society is already bringing about
radical changes in the way people work and interact with each other
and with information. The requirement for Universal Design stems
from the growing impact of the fusion of the emerging technologies,
and from the different dimensions of diversity, which are intrinsic
to the information society.
Develops a Comprehensive, Global Model for Contextually Based Processing Systems A new perspective on global information systems operation Helping to advance a valuable paradigm shift in the next generation and processing of knowledge, Introduction to Contextual Processing: Theory and Applications provides a comprehensive model for constructing a contextually based processing system. It explores the components of this system, the interactions of the components, key mathematical foundations behind the model, and new concepts necessary for operating the system. After defining the key dimensions of a model for contextual processing, the book discusses how data is used to develop a semantic model for contexts as well as language-driven context-specific processing actions. It then applies rigorous mathematical methods to contexts, examines basic sensor data fusion theory and applies it to the contextual fusion of information, and describes the means to distribute contextual information. The authors also illustrate a new type of data repository model to manage contextual data, before concluding with the requirements of contextual security in a global environment. This seminal work presents an integrated framework for the design and operation of the next generation of IT processing. It guides the way for developing advanced IT systems and offers new models and concepts that can support advanced semantic web and cloud computing capabilities at a global scale.
This book deals with a topical issue relating to the use of script in Japan, one which has the potential to reshape future script policy through the mediation of both orthographic practices and social relations. It tells the story of the impact of one of the most significant technological breakthroughs in Japan in the latter part of this century: the invention and rapid adoption of word-processing technology capable of handling Japanese script in a society where the nature of that script had previously mandated handwriting as the norm. The ramifications of this technology in both the business and personal spheres have been wide-ranging, extending from changes to business practices, work profiles, orthography and social attitudes to writing through to Japan's ability to construct a substantial presence on the Internet in recent years.
Cognitive task analysis is a broad area consisting of tools and
techniques for describing the knowledge and strategies required for
task performance. Cognitive task analysis has implications for the
development of expert systems, training and instructional design,
expert decision making and policymaking. It has been applied in a
wide range of settings, with different purposes, for instance:
specifying user requirements in system design or specifying
training requirements in training needs analysis. The topics to be
covered by this work include: general approaches to cognitive task
analysis, system design, instruction, and cognitive task analysis
for teams. The work settings to which the tools and techniques
described in this work have been applied include: 911 dispatching,
faultfinding on board naval ships, design aircraft, and various
support systems.
Grab your phone and your friends and start making fame-worthy content today! Get TikTok Famous Fast is a bite-sized guide to building your own empire on TikTok and using it as a launchpad for your personal brand and media career. Top TikTok stars and industry insiders provide their tips on how be a hit, how to make your content the best possible, how to tap into the latest memes and trends, how to edit and - most importantly - how to grow your following.
IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes organizations to ever-growing risks. Understanding the threats, assessing the risks, adapting the organization, selecting and implementing the appropriate controls, and implementing a management system are the activities required to establish proactive security governance that will provide management and customers the assurance of an effective mechanism to manage risks. IT Governance and Information Security: Guides, Standards, and Frameworks is a fundamental resource to discover IT governance and information security. This book focuses on the guides, standards, and maturity frameworks for adopting an efficient IT governance and information security strategy in the organization. It describes numerous case studies from an international perspective and brings together industry standards and research from scientific databases. In this way, this book clearly illustrates the issues, problems, and trends related to the topic while promoting the international perspectives of readers. This book offers comprehensive coverage of the essential topics, including: IT governance guides and practices; IT service management as a key pillar for IT governance; Cloud computing as a key pillar for Agile IT governance; Information security governance and maturity frameworks. In this new book, the authors share their experience to help you navigate today's dangerous information security terrain and take proactive steps to measure your company's IT governance and information security maturity and prepare your organization to survive, thrive, and keep your data safe. It aspires to provide a relevant reference for executive managers, CISOs, cybersecurity professionals, engineers, and researchers interested in exploring and implementing efficient IT governance and information security strategies.
Mothers have been looking for the middle ground for more than half a century. Staying at home and raising the kids full-time isn't it. Working full-time and rushing home to tuck the kids in at 7 p.m. sharp ain't it either. Even part-time work outside the house can be a scramble for most women, as they try to 'have it all' between 9 am and 5 pm. To work or not to work? That seems to be the bottom-line question for most women today. But, Audrey McClelland and Colleen Padilla are proving that the equation is changing. Both of them left behind the corporate ladder and Ivy League degrees to stay home with their children; but, instead of assigning them permanent stay-at-home status, this choice was the catalyst to their reinvention. Miles apart, they each sat down at their computers one day and began to blog. Slowly but surely, their audiences grew. The portability of computers and smart-phones, the connective powers of social networks, and an overwhelming desire to happily mix work and family enabled them to move past the Mommy Wars (i.e. stay at home mom vs. working mom) into a territory all their own. Audrey and Colleen literally blogged, tweeted, skyped, vlogged, and facebooked their ways to the top. In "The Digital Mom Handbook", they will show other moms how to find middle ground - via the frontier of the Internet - too. Do you want to be a booming six-figure eBay saleswoman? A 20-hour-a-week brand consultant? A local Twitter correspondent? The terms are yours to define. Money, hours-per-week, title - these don't dictate your Digital Mom success. Personal satisfaction does. According to Audrey and Colleen, finding middle-ground requires 7 basic steps that moms can start using now to achieve the kind of success they desire: find your passion (look around, stake out your turf); hang a digital 'shingle' and start typing; find your tribe and forge alliances; let karma breed opportunity (carefully make the most of your network); don't forget the children! (define your version of success and make sure you're truly on middle ground); manage the Benjamins (a.k.a. 'the money'); and, live happily ever after (live your values).
This special issue calls for a greater awareness of computing as a
critical area of study for those interested in educational studies.
Its purpose is to open up a wider dialogue about computing and
education than has previously existed in the field. The questions
raised provide the basis for a lively discussion and analysis of
the role of educational studies in interpreting the role of
computing in our culture and educational system. This issue also
provides a model for exploring other topics of similar significance
and importance to the field in future issues of the journal.
The Internet is transforming political institutions and modes of political communication. It is also transforming relaitons between states and between citizens. Above all it provides opportunities to create new political communities. This book provides examples of how it is beginning to do so at the sub-state, state and international levels. Both established democracies, such as the US, the UK and Germany, as well as authoritarian regimes in Asia and Africa, are having to come to terms with it. But although it can be a force for increased democracy and for the spread of human rights worldwide, it may also be used by anti-democratic groups who have previously been marginalised. Both ethnic minorities and neo-Nazi groups are already trying to make the most of the Internet. Strong democracy or a 1984-type state: both are possibilities, both present enormous challenges. |
![]() ![]() You may like...
Fundamental Rights Protection Online…
Bilyana Petkova, Tuomas Ojanen
Hardcover
R3,722
Discovery Miles 37 220
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,809
Discovery Miles 58 090
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R754
Discovery Miles 7 540
|