|
Showing 1 - 25 of
258 matches in All Departments
Now that there's software in everything, how can you make anything
secure? Understand how to engineer dependable systems with this
newly updated classic In Security Engineering: A Guide to Building
Dependable Distributed Systems, Third Edition Cambridge University
professor Ross Anderson updates his classic textbook and teaches
readers how to design, implement, and test systems to withstand
both error and attack. This book became a best-seller in 2001 and
helped establish the discipline of security engineering. By the
second edition in 2008, underground dark markets had let the bad
guys specialize and scale up; attacks were increasingly on users
rather than on technology. The book repeated its success by showing
how security engineers can focus on usability. Now the third
edition brings it up to date for 2020. As people now go online from
phones more than laptops, most servers are in the cloud, online
advertising drives the Internet and social networks have taken over
much human interaction, many patterns of crime and abuse are the
same, but the methods have evolved. Ross Anderson explores what
security engineering means in 2020, including: How the basic
elements of cryptography, protocols, and access control translate
to the new world of phones, cloud services, social media and the
Internet of Things Who the attackers are - from nation states and
business competitors through criminal gangs to stalkers and
playground bullies What they do - from phishing and carding through
SIM swapping and software exploits to DDoS and fake news Security
psychology, from privacy through ease-of-use to deception The
economics of security and dependability - why companies build
vulnerable systems and governments look the other way How dozens of
industries went online - well or badly How to manage security and
safety engineering in a world of agile development - from
reliability engineering to DevSecOps The third edition of Security
Engineering ends with a grand challenge: sustainable security. As
we build ever more software and connectivity into safety-critical
durable goods like cars and medical devices, how do we design
systems we can maintain and defend for decades? Or will everything
in the world need monthly software upgrades, and become unsafe once
they stop?
In the summer of 1499 Leonardo di Vinci is hired by Cesare Borga as
a military engineer. Leonardo begins to work on a steam canon that
had originally been an idea of Archimedes of Syracuse some 1500
years earlier. Cesare invites Leonardo to his headquarters for
diner to learn more about Archimedes. He soon discovers that
Leonardo seems to know a great deal about Archimedes. Leonardo has
in his possession a wooden chest filled with drawings and ideas
from Archimedes. In the course of the evening, Leonardo tells
Cesare all about the life of Archimedes. With the help of documents
from the chest, Leonardo tells the story of Archimedes of Syracuse,
and how he made many discoveries in mathematics and science.
Archimedes determined the true value of pi (3.14159) before the
concept of a zero was understood. He discovered the laws of levers,
equilibrium, and bouyancy. He invented many machines including war
machines that held the might of the Roman army at bay for a year.
At the request of his king, Archimedes visits Alexandria and the
great library there. He had corresponded with many of the great
scholars who resided at the nearby museum. While in Alexandria he
falls in love with Princess Helena, and inspite of their age
difference, they marry and return to Syracuse. Soon Helena gives
birth to their only child, a daughter they name Arsinoe. For nearly
fifty years, Syracuse experiences peace, and avoids being drawn
directly into the frequent conflicts between Rome and Carthage.
However, eventually war comes to Syracuse, and Archimedes must use
all his vast knowledge to defend Syracuse and his very family from
the Romans invaders. As Leonardo concludes his story, Cesare offers
to purchase the chest of ideas from Leonardo. Leonardo declines the
offer a leaves Cesare's headquarters, taking the chest and its
secrets with him. Who know which of Leonardo de Vinci's inventions
were really the brainchild of Archimedes of Syracuse?
"Knowing the beauty of life, a gift, a home, holds the weapon of
contentment, so never sway ..." In "Reaching for the Beauty and
Facts of Life, " Betty Anderson shares her first compilation of
free-verse poetry that encourages you to take a second look at the
world in which we all live and embrace differences, fears, and
loves of all humankind. With the hope that her poems will influence
thinking and create new ideas within each of us, Anderson-a teacher
who has always incorporated poetry into her classroom-not only
challenges cultural biases and religious perspectives, but also
provides charming views of nature and the antics of children as she
traces a lyrical journey through life. While incorporating subtle
life lessons into her poetry about friendship, family, and love,
Anderson also interweaves historical elements, as she shares the
contributions of African Americans and awakens others to the fears
we all face in today's world. This moving collection of poetry will
persuade you to reach into your heart and soul to create memorable
changes and accept the beauty of life.
PROJECT SYNOPSIS "Running The Corporate Rapids" My intention was to
create a book on the organizational and psychological ramifications
of transforming traditional corporate cultures into flexible,
dynamic, agile business enterprises. This is not a new theme, in
fact, much has been written on the subject by several authors. What
differentiates this work from that of previous publications is that
it is written from the perspective of someone that has been "in the
trenches" as both an operational CEO and a Business Consultant.
Previous attempts at "how to" books on this subject have dealt
largely with the structural/organizational aspects of this
transformation and have not effectively addressed the human
behavioral component. In fact, in an article in the Wall Street
Journal, an interview was conducted with the authors of
Re-engineering the Corporation, Michael Hammer and James Champy in
which The Journal stated "But the book, for all of its theoretical
elegance, glossed over the massive career disruptions caused by the
process. Re-engineering work usually required fewer workers and far
fewer managers. Managers resisted, stymieing many re-engineering
efforts." Both Hammer and Champy have agreed that they missed the
significant component --- the people. This is the exact area that
my book addresses. The book is a combination of theory, tools and
practical application formulas punctuated with anecdotal stories
from both operating and consulting experiences. This is a "shirt
sleeve," pragmatic guide to dealing with the problems, challenges
and opportunities facing managers and executives in every day
business situations. The message behind the book will be "Creating
a New Common Sense in Business." In the past American business has,
at best, given lip service to the concept of putting people first.
We have been resource based enterprises (money, bricks &
sticks, equipment, etc.) Today we have left the Industrial
(resource based) Era, have transition
The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R))
certification is one of the most important credentials an
information security practitioner can have. Having helped thousands
of people around the world obtain this distinguished certification,
the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has
quickly become the book that many of today's security practitioners
depend on to attain and maintain the required competence in the
seven domains of the (ISC)(2) CBK. Picking up where the popular
first edition left off, the Official (ISC)2 Guide to the SSCP CBK,
Second Edition brings together leading IT security tacticians from
around the world to discuss the critical role that policy,
procedures, standards, and guidelines play within the overall
information security management infrastructure. Offering
step-by-step guidance through the seven domains of the SSCP CBK,
the text: Presents widely recognized best practices and techniques
used by the world's most experienced administrators Uses accessible
language, bulleted lists, tables, charts, and diagrams to
facilitate a clear understanding Prepares you to join the thousands
of practitioners worldwide who have obtained (ISC)(2) certification
Through clear descriptions accompanied by easy-to-follow
instructions and self-assessment questions, this book will help you
establish the product-independent understanding of information
security fundamentals required to attain SSCP certification.
Following certification it will be a valuable guide to addressing
real-world security implementation challenges.
In this issue of Obstetrics and Gynecology Clinics of North
America, guest editors Drs. Jean R. Anderson and Grace Chen bring
their considerable expertise to the topic of Global Women's Health.
The goal of this unique issue is to explore some of the challenging
health problems that affect women worldwide and to make a positive
impact on the global health of women. Multinational authors provide
up-to-date reviews that address key clinical issues and critical
topics in the field. Contains 13 practice-oriented topics including
contraception and preconception care; interpersonal violence;
quality care for women; interprofessional care in obstetrics and
gynecology; surgical burden of disease in women; nonmedical factors
that impact women's health; and more. Provides in-depth clinical
reviews on global women's health, offering actionable insights for
clinical practice. Presents the latest information on this timely,
focused topic under the leadership of experienced editors in the
field. Authors synthesize and distill the latest research and
practice guidelines to create clinically significant, topic-based
reviews.
Cognitive Psychology takes students to the forefront of the field
and introduces them to key discoveries of cognitive psychology.
With accessible and clear explanations, Anderson shows students how
mental processes are investigated and how we know what we know
about the mind. This book introduces students to both the cutting
edge findings of cognitive neuroscience and classic behavioural
studies. Experimental data, sample stimuli, brain images, and
research tasks woven throughout the text give students a real
understanding of how research is conducted and the excitement of
discovery. Fascinating examples and applications of cognitive
theory keep students engaged.
This book achieves a goal that was set 25 years ago when the HAM
theory of human memory was published. This theory reflected one of
a number of then-current efforts to create a theory of human
cognition that met the twin goals of precision and complexity. Up
until then the standard for precision had been the mathematical
theories of the 1950s and 1960s. These theories took the form of
precise models of specific experiments along with some informal,
verbally-stated understanding of how they could be extended to new
experiments. They seemed to fall far short of capturing the breadth
and power of human cognition that was being demonstrated by the new
experimental work in human cognition. The next 10 years saw two
major efforts to address the problems of scope. In 1976, the ACT
theory was first described and included a production rule system of
procedural memory to complement HAM's declarative memory. This
provided a computationally adequate system which was indeed capable
of accounting for all sorts of cognition. In 1993, a new version of
ACT--ACT-R--was published. This was an effort to summarize the
theoretical progress made on skill acquisition in the intervening
10 years and to tune the subsymbolic level of ACT-R with the
insights of the rational analysis of cognition.
Although the appearance of generally-available, full-function code
set off a series of events which was hardly planned, it resulted in
this book. The catalyst for this was the emergence of a user
community. Lebiere insisted that assembling a critical mass of
users was essential to the ultimate success of the theory and that
a physical gathering was the only way to achieve that goal. This
resulted in the First Annual ACT-R Summer School and Workshop, held
in 1994. In writing the book, the authors became seized by an
aspiration that went beyond just describing the theory correctly.
They decided to try to display what the theory could do by
collecting together and describing some of its in-house
applications. This book reflects decades of work in ACT-R
accumulated by many researchers. The chapters are authored by the
people that did that particular work. No doubt the reader will be
impressed by the scope of the research and the quality of the
individual work. Less apparent, but no less important, was the
effort that everyone put into achieving the overall consistency and
technical integrity of the book. This is the first work in
cognitive science to precisely model such a wide range of phenomena
with a single theory.
The current popular and scientific interest in virtual environments
has provided a new impetus for investigating binaural and spatial
hearing. However, the many intriguing phenomena of spatial hearing
have long made it an exciting area of scientific inquiry.
Psychophysical and physiological investigations of spatial hearing
seem to be converging on common explanations of underlying
mechanisms. These understandings have in turn been incorporated
into sophisticated yet mathematically tractable models of binaural
interaction. Thus, binaural and spatial hearing is one of the few
areas in which professionals are soon likely to find adequate
physiological explanations of complex psychological phenomena that
can be reasonably and usefully approximated by mathematical and
physical models. This volume grew out of the Conference on Binaural
and Spatial Hearing, a four-day event held at Wright-Patterson Air
Force Base in response to rapid developments in binaural and
spatial hearing research and technology. Meant to be more than just
a proceedings, it presents chapters that are longer than typical
proceedings papers and contain considerably more review material,
including extensive bibliographies in many cases. Arranged into
topical sections, the chapters represent major thrusts in the
recent literature. The authors of the first chapter in each section
have been encouraged to take a broad perspective and review the
current state of literature. Subsequent chapters in each section
tend to be somewhat more narrowly focused, and often emphasize the
authors' own work. Thus, each section provides overview,
background, and current research on a particular topic. This book
is significant in that it reviews the important work during the
past 10 to 15 years, and provides greater breadth and depth than
most of the previous works.
This edition has been revised throughout to take account of recent
changes and to incorporate amendments required due to the
publication of the revised BS 5328. The manual provides information
on all aspects of the ready-mixed concrete industry, from basic
materials and their properties to the production, quality control
and use of ready-mixed concrete. Discussion of the qualities of
concrete and the achievement of quality requirements leads to the
consideration of specifying concrete quantities. Attention is then
turned from production to delivery. The authors discuss arguments
for choosing ready-mixed concrete, and deal with the fundamental
issues of obtaining quotations, ordering and handling. While
providing a detailed ready reference, this book also gives the
reader a perspective on the industry as a whole.
|
|