![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 6 of 6 matches in All Departments
Although it is hardly publicized, something remarkable is happening to Organized Labor. Key players in the United States and abroad are busy modernizing their communications, and making creative and effective use of computers and other technology. Drawing on "infotech" devices (computer networks, the Internet, video conferencing, fax machines, wireless communication, and multi-media), Labor struggles to renew its "voice" and "ears", and, in the process, new hope has been stirred that this just might help it transform its organizational culture, refine its mission, and reinvent itself. The road to creating a CyberUnion (the combination of four strategic reform aids -- futuristics, innovations, services, and traditions -- knitted together with infotech resources into a comprehensive industrial relations model) has already begun and unions already embracing this model are ensuring a position of strength in the 21st century. CyberUnion is a bold plan for Organized Labor to remain strong for many decades to come, and this work examines the components of the model, progress already made, and plans to ensure continued success.
Key players in organized labour in the USA and abroad are busy modernizing their communications and making creative and effective use of computers and other technology. The author of this book argues that the road to CyberUnion has begun and that those unions are ensuring a future strength.
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.
As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn--in a structured and memorable way--about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow. This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don't need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master. You'll also find: Understandable and memorable introductions to the most important threats that every engineer should know Straightforward software security frameworks that will help engineers bake security directly into their systems Strategies to align large teams to achieve application security in today's fast-moving and agile world Strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaigns An indispensable resource for software developers and security engineers, Threats: What Every Engineer Should Learn From Star Wars belongs on the bookshelves of everyone delivering or operating technology: from engineers to executives responsible for shipping secure code.
After the terrorist attacks of September 11, 2001, the United States government attempts to counter future acts of terrorism against the United States and its allies. The CIA's response to this executive order is Jay Weaver's revolutionary invention; a covert listening device that fuses nanotechnology with artificial intelligence. Jay, a quirky and innovative engineer tortured by numerous personal difficulties-the recollection of his girlfriend's infidelity, his father's psychological manipulation, and his mother's mental illness-immerses himself in his work to avoid confronting this pain, striving to prove himself as a capable engineer and project leader while unwittingly placing himself, his family, and the Constitutional rights of all Americans at risk. Once the government's hidden agenda for the use of his creation is discovered, Jay finds himself torn between completing his work and destroying it to spare the world a future filled with fear and paranoia.
|
You may like...
DEFA - East German Cinema 1946-1992
Sean Allan, John Sandford
Hardcover
R2,847
Discovery Miles 28 470
|