krainaksiazek security and intelligence issues in an evolving world 20124277

- znaleziono 24 produkty w 3 sklepach

Advanced Cyber Security - 2826941444

231,34 zł

Advanced Cyber Security John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

Attain true cyber security amidst ever-evolving threats using a holistic approach to defense Advanced Cyber Security is a practical guide to protecting your organization from cyber attacks using advanced active counter measures. Predict and guard against cyber attacks before they occur, by implementing cutting-edge static and dynamic active defense operations based on attack profile intelligence. This book walks you through the tools, techniques, and strategies that keep your organization's information secure, providing tips and tricks, as well as warning about common pitfalls. Case studies demonstrate the latest in attack intelligence profiling, active defense through social media, email operations, crowd sourcing, and cross-disciplinary data science applications, giving you insight into how these tools are being applied most effectively by companies around the world. A discussion about the future of cyber security proposes future defense models and provides an insightful look at what's coming down the pipeline. Cyber-threats are a top priority for businesses and governments and, as the threats change and develop, the need for effective countermeasures will only increase. This book helps you get out in front of the threat with a robust defense strategy, utilizing the newest, most effective methods in the field today. * Locate your system's vulnerabilities * Build an effective defense against attacks * Navigate the new security ecosystem * Explore emerging cyber defense technology Effective cyber defense requires a holistic approach. Attacks can come from any quarter, and are becoming increasingly sophisticated, leaving traditional countermeasures wholly inadequate and reactive approaches insufficient. Defense-as-usual is now simply damage control. Advanced Cyber Security shows you what true cyber security now requires, and gives you clear guidance toward effective implementation.

Sklep: Libristo.pl

Contemporary Security Studies - 2826826751

185,81 zł

Contemporary Security Studies Oxford University Press

Książki / Literatura obcojęzyczna

Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the field, it features an impressive breadth and depth of coverage of the different theoretical approaches to the study of security and the ever-evolving range of issues that dominate the security agenda in the 21st Century. Throughout the text, students are encouraged to question their own preconceptions and assumptions, and to use their own judgement to critically evaluate key approaches and ideas. To help them achieve this, each chapter is punctuated with helpful learning features including 'key ideas', 'think points' and case studies, demonstrating the real world applications and implications of the theory. In addition to covering a wide range of topical security issues, from terrorism and inter-state armed conflict to cybersecurity, health, and transnational crime, the fourth edition features a new chapter on postcolonialism and expanded coverage of critical security studies. The book is supported by an Online Resource Centre designed to help students take their learning further. For students: - Explore relevant security issues in greater depth with additional online case studies. - Test your understanding of the key ideas and themes in each chapter with self-marking multiple-choice questions. For registered lecturers: - Use the adaptable PowerPoint slides as the basis for lecture presentations, or as hand-outs in class.

Sklep: Libristo.pl

Information Security - 2826724258

577,54 zł

Information Security Wiley-Blackwell (an imprint of John Wiley & Sons...

Książki / Literatura obcojęzyczna

Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive set of classroom-tested PowerPoint slides and a solutions manual are available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields. A solutions manual is available. Please email digialo@wiley.com to obtain it.

Sklep: Libristo.pl

Security Leader Insights for Business Continuity - 2827169427

92,99 zł

Security Leader Insights for Business Continuity Elsevier Science & Technology

Książki / Literatura obcojęzyczna

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Business Continuity, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in business continuity. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. It includes chapters on the business resiliency and emergency preparedness, leading during a crisis, corporate social responsibility, and the Voluntary Private Sector Preparedness Certification Program. Security Leader Insights for Business Continuity is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. * Each chapter can be read in five minutes or less, and is written by or contains insights from experienced security leaders.* Can be used to find illustrations and examples you can use to deal with a relevant issue.* Brings together the diverse experiences of proven security leaders in one easy-to-read resource.

Sklep: Libristo.pl

Globalization and Security - 2836096438

528,96 zł

Globalization and Security Praeger Security International

Książki / Literatura obcojęzyczna

Globalization and Security: An Encyclopedia addresses the need for an authoritative, but accessible analysis of the impact of globalization on security and its multifaceted aspects. Broad in scope, this two-volume set covers the economic and political aspects of globalization, as well as its social and cultural impacts. More importantly, it is the first work to focus explicitly on security, including human security broadly conceived, and the role that globalization plays in the world's new and ever-evolving security environment. While more books on globalization are becoming available, none focus on the impact of globalism on security-related issues as this set does. Drawing on the expertise of specialists from many disciplines and nations, Globalization and Security directly addresses the needs of one of the fastest-growing areas of study, the intersection of globalization and security worldwide.

Sklep: Libristo.pl

Advances in Cyber Security - 2827090647

432,11 zł

Advances in Cyber Security Fordham University Press

Książki / Literatura obcojęzyczna

As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. The proliferation of social networking and advancement of information technology provide endless benefits in our living and working environments. However, these benefits also bring horrors in various forms of cyber threats and exploitations. Advances in Cyber Security collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries to provide ways and means to secure and sustain the cyberspace ecosystem. Readers are given a first-hand look at critical intelligence on cybercrime and security--including details of real-life operations. The vast, useful knowledge and experience shared in this essential new volume enables cyber citizens and cyber professionals alike to conceive novel ideas and construct feasible and practical solutions for defending against all kinds of adversaries and attacks. Among the many important topics covered in this collection are building a secure cyberspace ecosystem; public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem.

Sklep: Libristo.pl

National Security - 2212829411

708,30 zł

National Security Elsevier Science Publishers

Inne 1

This edited volume is intended to address in a comprehensive and integrated manner three major areas of national and international security research from an information systems-centric perspective: legal and policy frameworks; intelligence and security informatics; and emergency preparedness and infrastructure protection. The discussions are replete with real-world case studies and examples that present the concepts using an integrated, action-oriented and theory-based approach to validate the frameworks presented and to provide specific insights on the technical approaches and organizational issues under investigation.This book is intended to be used as both a textbook and a comprehensive research handbook. The contributors to this edited volume are renowned experts in their respective fields. Most of the chapters contained in this book provide an updated comprehensive survey of the related field and also specific findings from cutting-edging innovative research. To facilitate its adoption as a textbook, all the authors have included specific discussion questions that could be utilized to stimulate discussions and potentially further research in the area. This book addresses three

Sklep: Albertus.pl

Governance In A Globalizing World - 2840063598

154,99 zł

Governance In A Globalizing World

Książki Obcojęzyczne>Angielskie>Society & social sciences>Society & culture: general>Social issues & processes>GlobalizationKsiążki Obc...

An Exploration Of The Impact Of Governance On Culture, Economics, Security And The Environment In A Globalized World. The Book Aims To Answer Three Questions: How Are Patterns Of Globalization Currently Evolving?; How Do These Patterns Affect Governance?; And How Might Globalism Itself Be Governed?

Sklep: Gigant.pl

SOA Design Patterns - 2850427049

428,57 zł

SOA Design Patterns PEARSON

Książki / Literatura obcojęzyczna

"SOA Design Patterns is an important contribution to the literature and practice of building and delivering quality software-intensive systems." - Grady Booch, IBM Fellow "With the continued explosion of services and the increased rate of adoption of SOA through the market, there is a critical need for comprehensive, actionable guidance that provides the fastest possible time to results. Microsoft is honored to contribute to the SOA Design Patterns book, and to continue working with the community to realize the value of Real World SOA." - Steven Martin, Senior Director, Developer Platform Product Management, Microsoft "SOA Design Patterns provides the proper guidance with the right level of abstraction to be adapted to each organization's needs, and Oracle is pleased to have contributed to the patterns contained in this book." - Dr. Mohamad Afshar, Director of Product Management, Oracle Fusion Middleware, Oracle "Red Hat is pleased to be involved in the SOA Design Patterns book and contribute important SOA design patterns to the community that we and our customers have used within our own SOA platforms. I am sure this will be a great resource for future SOA practitioners." - Pierre Fricke Director, Product Line Management, JBoss SOA Platform, Red Hat "A wealth of proven, reusable SOA design patterns, clearly explained and illustrated with examples. An invaluable resource for all those involved in the design of service-oriented solutions." - Phil Thomas, Consulting IT Specialist, IBM Software Group "This obligatory almanac of SOA design patterns will become the foundation on which many organizations will build their successful SOA solutions. It will allow organizations to build their own focused SOA design patterns catalog in an expedited fashion knowing that it contains the wealth and expertise of proven SOA best practices." - Stephen Bennett, Director, Technology Business Unit, Oracle Corporation "The technical differences between service orientation and object orientation are subtle enough to confuse even the most advanced developers. Thomas Erl's book provides a great service by clearly articulating SOA design patterns and differentiating them from similar OO design patterns." - Anne Thomas Manes, VP & Research Director, Burton Group "SOA Design Patterns does an excellent job of laying out and discussing the areas of SOA design that a competent SOA practitioner should understand and employ." - Robert Laird, SOA Architect, IBM "As always, Thomas delivers again. In a well-structured and easy-to-understand way, this book provides a wonderful collection of patterns each addressing a typical set of SOA design problems with well articulated solutions. The plain language and hundreds of diagrams included in the book help make the complicated subjects of SOA design comprehensible even to those who are new to the SOA design world. It's a must-have reference book for all SOA practitioners, especially for enterprise architects, solution architects, developers, managers, and business process experts." - Canyang Kevin Liu, Solution Architecture Manager, SAP "The concept of service oriented architecture has long promised visions of agile organizations being able to swap out interfaces and applications as business needs change. SOA also promises incredible developer and IT productivity, with the idea that key services would be candidates for cross-enterprise sharing or reuse. But many organizations' efforts to move to SOA have been mired-by organizational issues, by conflicting vendor messages, and by architectures that may amount to little more than Just a Bunch of Web Services. There's been a lot of confusion in the SOA marketplace about exactly what SOA is, what it's supposed to accomplish, and how an enterprise goes about in making it work. SOA Design Patterns is a definitive work that offers clarity on the purpose and functioning of service oriented architecture. SOA Design Patterns not only helps the IT practitioner lay the groundwork for a well-functioning SOA effort across the enterprise, but also connects the dots between SOA and the business requirements in a very concrete way. Plus, this book is completely technology agnostic-SOA Design Patterns rightly focuses on infrastructure and architecture, and it doesn't matter whether you're using components of one kind or another, or Java, or .NET, or Web services, or REST-style interfaces. While no two SOA implementations are alike, Thomas Erl and his team of contributors have effectively identified the similarities in composition services need to have at a sub-atomic level in order to interact with each other as we hope they will. The book identifies 85 SOA design patterns which have been developed and thoroughly vetted to ensure that a service-oriented architecture does achieve the flexibility and loose coupling promised. The book is also compelling in that it is a living document, if you will, inviting participation in an open process to identify and formulate new patterns to this growing body of knowledge." - Joe McKendrick, Independent Analyst, Author of ZDNet's SOA Blog "If you want to truly educate yourself on SOA, read this book." - Sona Srinivasan, Global Client Services & Operations, CISCO "An impressive decomposition of the process and architectural elements that support serviceoriented analysis, design, and delivery. Right-sized and terminologically consistent. Overall, the book represents a patient separation of concerns in respect of the process and architectural parts that underpin any serious SOA undertaking. Two things stand out. First, the pattern relationship diagrams provide rich views into the systemic relationships that structure a service-oriented architecture: these patterns are not discrete, isolated templates to be applied mechanically to the problem space; rather, they form a network of forces and constraints that guide the practitioner to consider the task at hand in the context of its inter-dependencies. Second, the pattern sequence diagrams and accompanying notes provide a useful framework for planning and executing the many activities that comprise an SOA engagement." - Ian Robinson, Principal Technology Consultant, ThoughtWorks "Successful implementation of SOA principles requires a shift in focus from software system means, or the way capabilities are developed, to the desired end results, or real-world effects required to satisfy organizational business processes. In SOA Design Patterns, Thomas Erl provides service architects with a broad palette of reusable service patterns that describe service capabilities that can cut across many SOA applications. Service architects taking advantage of these patterns will save a great deal of time describing and assembling services to deliver the real world effects they need to meet their organization's specific business objectives." - Chuck Georgo, Public Safety and National Security Architect "In IT, we have increasingly come to see the value of having catalogs of good solution patterns in programming and systems design. With this book, Thomas Erl brings a comprehensive set of patterns to bear on the world of SOA. These patterns enable easily communicated, reusable, and effective solutions, allowing us to more rapidly design and build out the large, complicated and interoperable enterprise SOAs into which our IT environments are evolving." - Al Gough, Business Systems Solutions CTO, CACI International Inc. "This book provides a comprehensive and pragmatic review of design issues in service-centric design, development, and evolution. The Web site related to this book [SOAPatterns.org] is a wonderful platform and gives the opportunity for the software community to maintain this catalogue..." - Veronica Gacitua Decar, Dublin City University "Erl's SOA Design Patterns is for the IT decision maker determined to make smart architecture design choices, smart investments, and long term enterprise impact. For those IT professionals committed to service-orientation as a value-added design and implementation option, Patterns offers a credible, repeatable approach to engineering an adaptable business enterprise. This is a must read for all IT architect professionals." - Larry Gloss, VP and General Manager, Information Manufacturing, LLC "These SOA patterns define, encompass, and comprise a complete repertoire of best practices for developing a world-class IT SOA portfolio for the enterprise and its organizational units through to service and schema analysis and design. After many years as an architect on many SOA projects, I strongly recommend this book be on the shelf of every analyst and technical member of any SOA effort, right next to the SOA standards and guidelines it outlines and elucidates the need for. Our SOA governance standards draw heavily from this work and others from this series." - Robert John Hathaway III, Enterprise Software Architect, SOA Object Systems "A wise man once told me that wisdom isn't all about knowledge and intelligence, it is just as much about asking questions. Asking questions is the true mark of wisdom and during the writing of the SOA Design Patterns book Thomas Erl has shown his real qualities. The community effort behind this book is huge meaning that Thomas has had access to the knowledge and experience of a large group of accomplished practitioners. The result speaks for itself. This book is packed with proven solutions to recurring problems, and the documented pros and cons of each solution have been verified by persons with true experience. This book could give SOA initiatives of any scale a real boost." - Herbjorn Wilhelmsen, Architect and Senior Consultant, Objectware "This book is an absolute milestone in SOA literature. For the first time we are provided with a practical guide on how the principle centric description of service orientation from a vendor-agnostic viewpoint is actually made to work in a language based on patterns. This book makes you talk SOA! There are very few who understand SOA like Thomas Erl does, he actually put's it all together!" - Brian Lokhorst, Solution Architect, Dutch Tax Office "Service oriented architecture is all about best practices we have learned since IT's existence. This book takes all those best practices and bundles them into a nice pattern catalogue. [It provides] a really excellent approach as patterns are not just documented but are provided with application scenarios through case studies [which] fills the gap between theory and practice." - Shakti Sharma, Senior Enterprise Architect, Sysco Corp "An excellent and important book on solving problems in SOA [with a] solid structure. Has the potential of being among the major influential books." - Peter Chang, Lawrence Technical University "SOA Design Patterns presents a vast amount of knowledge about how to successfully implement SOA within an organization. The information is clear, concise, and most importantly, legitimate." - Peter B. Woodhull, President and Principal Architect, Modus21 "SOA Design Patterns offers real insights into everyday problems that one will encounter when investing in services oriented architecture. [It] provides a number of problem descriptions and offers strategies for dealing with these problems. SOA design patterns highlights more than just the technical problems and solutions. Common organizational issues that can hinder progress towards achieving SOA migration are explained along with potential approaches for dealing with these real world challenges. Once again Thomas Erl provides in-depth coverage of SOA terminology and helps the reader better understand and appreciate the complexities of migrating to an SOA environment." - David Michalowicz, Air and Space Operations Center Modernization Team Lead, MITRE Corporation "This is a long overdue, serious, comprehensive, and well-presented catalog of SOA design patterns. This will be required reading and reference for all our SOA engineers and architects. The best of the series so far! [The book] works in two ways: as a primer in SOA design and architecture it can easily be read front-to-back to get an overview of most of the key design issues you will encounter, and as a reference catalog of design techniques that can be referred to again and again..." - Wendell Ocasio, Architecture Consultant, DoD Military Health Systems, Agilex Technologies "Thomas has once again provided the SOA practitioner with a phenomenal collection of knowledge. This is a reference that I will come back to time and time again as I move forward in SOA design efforts. What I liked most about this book is its vendor agnostic approach to SOA design patterns. This approach really presents the reader with an understanding of why or why not to implement a pattern, group patterns, or use compound patterns rather than giving them a marketing spiel on why one implementation of a pattern is better than another (for example, why one ESB is better than another). I think as SOA adoption continues to advance, the ability for architects to understand when and why to apply specific patterns will be a driving factor in the overall success and evolution of SOA. Additionally, I believe that this book provides the consumer with the understanding required to chose which vendor's SOA products are right for their specific needs." - Bryan Brew, SOA Consultant, Booz Allen Hamilton "A must have for every SOA practitioner." - Richard Van Schelven, Principal Engineer, Ericsson "This book is a long-expected successor to the books on object-oriented design patterns and integration patterns. It is a great reference book that clearly and thoroughly describes design patterns for SOA. A great read for architects who are facing the challenge of transforming their enterprise into a service-oriented enterprise." - Linda Terlouw, Solution Architect, Ordina "The maturation of Service-Orientation has given the industry time to absorb the best practices of service development. Thomas Erl has amassed this collective wisdom in SOA Design Patterns, an absolutely indispensible addition to any Service Oriented bookshelf." - Kevin P. Davis, Ph.D "The problem with most texts on SOA is one of specificity. Architects responsible for SOA implementation in most organizations have little time for abstract theories on the subject, but are hungry for concrete details that they can relate to the real problems they face in their environment. SOA Design Patterns is critical reading for anyone with service design responsibilities. Not only does the text provide the normal pattern templates, but each pattern is applied in detail against a background case study to provide exceptionally meaningful context to the information. The graphic visualizations of the problems and pattern solutions are excellent supplementary companions to the explanatory text. This book will greatly stretch the knowledge of the reader as much for raising and addressing issues that may have never occurred to the reader as it does in treating those problems that are in more common occurrence. The real beauty of this book is in its plain English prose. Unlike so many technical reference books, one does not find themselves re-reading sections multiple times trying to discern the intent of the author. This is also not a reference that will sit gathering dust on a shelf after one or two perusings. Practitioners will find themselves returning over and over to utilize the knowledge in their projects. This is as close as you'll come to having a service design expert sitting over your shoulder." - James Kinneavy, Principal Software Architect, University of California "As the industry converges on SOA patterns, Erl provides an outstanding reference guide to composition and integration-and yet another distinctive contribution to the SOA practice." - Steve Birkel, Chief IT Technical Architect, Intel Corp. "With SOA Design Patterns, Thomas Erl adds an indispensable SOA reference volume to the technologist's library. Replete with to-the-point examples, it will be a helpful aid to any IT organization." - Ed Dodds, Strategist, Systems Architect, Conmergence "Again, Thomas Erl has written an indispensable guide to SOA. Building on his prior successes, his patterns go into even more detail. Therefore, this book is not only helpful to the SOA beginner, but also provides new insight and ideas to professionals." - Philipp Offermann, Research Scientist, Technische Universitat Berlin, Germany "SOA Design Patterns is an extraordinary contribution to SOA best practices! Once again, Thomas has created an indispensable resource for any person or organization interested in or actively engaged in the practice of Service Oriented Architecture. Using case studies based on three very different business models, Thomas guides the reader through the process of selecting appropriate implementation patterns to ensure a flexible, well-performing, and secure SOA ecosystem." - Victor Brown, Managing Partner and Principal Consultant, Cypress Management Group Corporation In cooperation with experts and practitioners throughout the SOA community, best-selling author Thomas Erl brings together the de facto catalog of design patterns for SOA and service-orientation. More than three years in development and subjected to numerous industry reviews, the 85 patterns in this full-color book provide the most successful and proven design techniques to overcoming the most common and critical problems to achieving modern-day SOA. Through numerous examples, individually documented pattern profiles, and over 400 color illustrations, this book provides in-depth coverage of: * Patterns for the design, implementation, and governance of service inventories-collections of services representing individual service portfolios that can be independently modeled, designed, and evolved. * Patterns specific to service-level architecture which pertain to a wide range of design areas, including contract design, security, legacy encapsulation, reliability, scalability, and a variety of implementation and governance issues. * Service composition patterns that address the many aspects associated with combining services into aggregate distributed solutions, including topics such as runtime messaging and message design, inter-service security controls, and transformation. * Compound patterns (such as Enterprise Service Bus and Orchestration) and recommended pattern application sequences that establish foundational processes. The book begins by establishing SOA types that are referenced throughout the patterns and then form the basis of a final chapter that discusses the architectural impact of service-oriented computing in general. These chapters bookend the pattern catalog to provide a clear link between SOA design patterns, the strategic goals of service-oriented computing, different SOA types, and the service-orientation design paradigm. This book series is further supported by a series of resources sites, including soabooks.com, soaspecs.com, soapatterns.org, soamag. com, and soaposters.com.

Sklep: Libristo.pl

Richard Aldrich - GCHQ - 2845907179

74,49 zł

Richard Aldrich - GCHQ Harper Collins

Książki / Literatura obcojęzyczna

As we become ever-more aware of how our governments "eavesdrop" on our conversations, here is a gripping exploration of this unknown realm of the British secret service: Government Communication Headquarters (GCHQ). GCHQ is the successor to the famous Bletchley Park wartime code-breaking organisation and is the largest and most secretive intelligence organisation in the country. During the war, it commanded more staff than MI5 and MI6 combined and has produced a number of intelligence triumphs, as well as some notable failures. Since the end of the Cold War, it has played a pivotal role in shaping Britain's secret state. Still, we know almost nothing about it. In this ground-breaking new book, Richard Aldrich traces GCHQ's evolvement from a wartime code-breaking operation based in the Bedfordshire countryside, staffed by eccentric crossword puzzlers, to one of the world leading espionage organisations. It is packed full of dramatic spy stories that shed fresh light on Britain's role in the Cold War - from the secret tunnels dug beneath Vienna and Berlin to tap Soviet phone lines, and daring submarine missions to gather intelligence from the Soviet fleet, to the notorious case of Geoffrey Pine, one of the most damaging moles ever recruited by the Soviets inside British intelligence. The book reveals for the first time how GCHQ operators based in Cheltenham affected the outcome of military confrontations in far-flung locations such as Indonesia and Malaya, and exposes the shocking case of three GCHQ workers who were killed in an infamous shootout with terrorists while working undercover in Turkey. Today's GCHQ struggles with some of the most difficult issues of our time. A leading force of the state's security efforts against militant terrorist organisations like Al-Qaeda, they are also involved in fundamental issues that will mould the future of British society. Compelling and revelatory, Aldrich's book is the crucial missing link in Britain's intelligence history.

Sklep: Libristo.pl

Professional Microsoft PowerPivot for Excel and SharePoint - 2826627165

175,03 zł

Professional Microsoft PowerPivot for Excel and SharePoint Wiley

Książki / Literatura obcojęzyczna

With PowerPivot, Microsoft brings the power of Microsoft's business intelligence tools to Excel and SharePoint users. Self-service business intelligence today augments traditional BI methods, allowing faster response time and greater flexibility. If you're a business decision-maker who uses Microsoft Office or an IT professional responsible for deploying and managing your organization's business intelligence systems, this guide will help you make the most of PowerPivot. Professional Microsoft PowerPivot for Excel and SharePoint describes all aspects of PowerPivot and shows you how to use each of its major features. By the time you are finished with this book, you will be well on your way to becoming a PowerPivot expert. This book is for people who want to learn about PowerPivot from end to end. You should have some rudimentary knowledge of databases and data analysis. Familiarity with Microsoft Excel and Microsoft SharePoint is helpful, since PowerPivot builds on those two products. This book covers the first version of PowerPivot, which ships with SQL Server 2008 R2 and enhances Microsoft Office 2010. It provides an overview of PowerPivot and a detailed look its two components: PowerPivot for Excel and PowerPivot for SharePoint. It explains the technologies that make up these two components, and gives some insight into why these components were implemented the way they were. Through an extended example, it shows how to build a PowerPivot application from end to end. The companion Web site includes all the sample applications and reports discussed. What This Book Covers After discussing self-service BI and the motivation for creating PowerPivot, the book presents a quick, end-to-end tutorial showing how to create and publish a simple PowerPivot application. It then drilsl into the features of PowerPivot for Excel in detail and, in the process, builds a more complex PowerPivot application based on a real-world case study. Finally, it discusses the server side of PowerPivot (PowerPivot for SharePoint) and provides detailed information about its installation and maintenance. Chapter 1, "Self-Service Business Intelligence and Microsoft PowerPivot," begins Part I of the book. This chapter describes self-service BI and introduces PowerPivot, Microsoft's first self-service BI tool. It provides a high-level look at the two components that make up PowerPivot - PowerPivot for Excel and PowerPivot for SharePoint. Chapter 2, "A First Look at PowerPivot," walks you through a simple example of creating a PowerPivot application from end to end. In the process, it shows how to set up the two components of PowerPivot, and describes the normal workflow of creating a simple PowerPivot application. Chapter 3, "Assembling Data," starts off Part II of the book, and explains how to bring data into PowerPivot from various external data sources. It also introduces the extended example that you will build in this and subsequent chapters. Chapter 4, "Enriching Data," shows how to enhance the data you brought into your application by creating relationships and using PowerPivot's expression language, Data Analysis Expressions (DAX). Chapter 5, "Self-Service Analysis," describes how to use your PowerPivot data with various Excel features, such as PivotTables, PivotCharts, and slicers to do analysis. Chapter 5 also delves further into DAX, showing how to create and use DAX measures. Chapter 6, "Self-Service Reporting," shows how to publish your PowerPivot workbook to the server side of PowerPivot (PowerPivot for SharePoint), and make use of its features to view and update PowerPivot reports. It also shows how to use the data in a PowerPivot workbook as a data source for reports created in other tools such as Report Builder 3.0 and Excel. Chapter 7, "Preparing for SharePoint 2010," is the first chapter in Part III of the book. It describes the components of SharePoint 2010 that are relevant for PowerPivot, and looks at how PowerPivot for SharePoint interacts with those components. Chapter 8, "PowerPivot for SharePoint Setup and Configuration," provides instructions on how to set up and configure a multi-machine SharePoint farm that contains PowerPivot for SharePoint. Chapter 9, "Troubleshooting, Monitoring, and Securing PowerPivot Services," gives tips on how to troubleshoot PowerPivot for SharePoint issues. It also shows how to monitor the health of your PowerPivot for SharePoint environment, and discusses relevant security issues. Chapter 10, "Diving into the PowerPivot Architecture," describes at a deeper level the architecture of PowerPivot, both client and server. It also explains the Windows Identity Foundation and discusses the use of Kerberos in the context of PowerPivot for SharePoint. Chapter 11, "Enterprise Considerations," talks about common PowerPivot for SharePoint enterprise considerations: capacity planning, optimizing the environment, upgrade considerations, and uploading performance. Appendix A provides instructions for setting up the data sources that are used to build the SDR Healthcare extended example in Chapters 3 through 6. Additionally, two "bonus" elements are available online at this book's companion Web site: Appendix B is a comprehensive DAX reference that describes all the DAX functions and provides code snippets that show how to use them. A special chapter describes real-world scenarios in which PowerPivot is used to solve common problems.

Sklep: Libristo.pl

Dark Web - 2826663972

841,86 zł

Dark Web Springer, Berlin

Książki / Literatura obcojęzyczna

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. §This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions: methodological issues in Dark Web research; database and computational techniques to support information collection and data mining; and legal, social, privacy, and data confidentiality challenges and approaches. It will bring useful knowledge to scientists, security professionals, counterterrorism experts, and policy makers. The monograph can also serve as a reference material or textbook in graduate level courses related to information security, information policy, information assurance, information systems, terrorism, and public policy.

Sklep: Libristo.pl

Blondie 24 - 2212826918

103,00 zł

Blondie 24 Morgan Kaufmann

Informatyka

Blondie24 tells the story of a computer that taught itself to play checkers far better than its creators ever could by using a program that emulated the basic principles of Darwinian evolution--random variation and natural selection-- to discover on its own how to excel at the game. Unlike Deep Blue, the celebrated chess machine that beat Garry Kasparov, the former world champion chess player, this evolutionary program didn't have access to strategies employed by human grand masters, or to databases of moves for the endgame moves, or to other human expertise about the game of chekers. With only the most rudimentary information programmed into its "brain," Blondie24 (the program's Internet username) created its own means of evaluating the complex, changing patterns of pieces that make up a checkers game by evolving artificial neural networks---mathematical models that loosely describe how a brain works.It's fitting that Blondie24 should appear in 2001, the year when we remember Arthur C. Clarke's prediction that one day we would succeed in creating a thinking machine. In this compelling narrative, David Fogel, author and co-creator of Blondie24, describes in convincing detail how evolutionary computation may help to bring us closer to Clarke's vision of HAL. Along the way, he gives readers an inside look into the fascinating history of AI and poses provocative questions about its future.* Brings one of the most exciting areas of AI research to life by following the story of Blondie24's development in the lab through her evolution into an expert-rated checkers player, based on her impressive success in Internet competition.* Explains the foundations of evolutionary computation, simply and clearly.* Presents complex material in an engaging style for readers with no background in computer science or artificial intelligence.* Examines foundational issues surrounding the creation of a thinking machine.* Debates whether the famous Turing Test really tests for intelligence.* Challenges deeply entrenched myths about the successes and implication of some well-known AI experiments * Shows Blondie's moves with checkerboard diagrams that readers can easily follow.

Sklep: Albertus.pl

Strategic Engagement in Global S&t - 2843290168

229,25 zł

Strategic Engagement in Global S&t National Academies Press

Książki / Literatura obcojęzyczna

According to recent reports, the United States currently accounts for less than one-third of global research and development spending, and it is projected that this fraction will decline to 18% by 2050. These statistics, compounded by the recognition that the United States no longer maintains technological superiority across all research fields, highlight the need for the U.S. research community to stay abreast of emerging science and technology (S&T) around the world, to leverage others' investments, and to seek out collaborations in areas where researchers need to remain at the leading edge. The United States' Department of Defense (DoD) has long relied on its historical technological superiority to maintain military advantage. However, as the U.S. share of S&T output shrinks and as the U.S. defense research enterprise struggles to keep pace with the expanding challenges of the evolving security environment and the increased speed and cost of global technology development, the DoD must reexamine its strategy for maintaining awareness of emerging S&T developments occurring around the world. To fully leverage these advances and to make strategic research investments, the DoD must assess with whom and in which areas it should collaborate. To delve more deeply into the implications of the globalization of S&T and of international S&T engagement for the DoD, the Office of Naval Research, the Air Force Office of Scientific Research, and the Office of the Deputy Assistant Secretary of the Army for Research and Technology asked the National Research Council to assess current DoD strategies in the three Services - Army, Air Force, and Navy - for leveraging global S&T and for implementing and coordinating these strategies across the department. "Strategic Engagement in Global S&T" assesses the opportunities and challenges stemming from the globalization of S&T and the implications for the DoD and its Services. This report considers DoD strategies in the three Services for leveraging global S&T and implementation and coordination of these strategies across DoD. The report explores models for global S&T engagement utilized by other domestic and foreign organizations."Strategic Engagement in Global S&T" assesses how the ongoing globalization of S&T may impact research funding and priorities and workforce needs, as well as issues of building and maintaining trusted relationships and avoiding technology surprises. This report will be of interest to researchers and industry professionals with expertise in the globalization of science and technology, international engagement, the defense research enterprise, program evaluation, and national security.

Sklep: Libristo.pl

Cryptography Engineering - 2826907229

223,78 zł

Cryptography Engineering Wiley

Książki / Literatura obcojęzyczna

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Sklep: Libristo.pl

szukaj w Kangoo krainaksiazek security and intelligence issues in an evolving world 20124277

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z krainaksiazek pl security and intelligence issues in an evolving world 20124277

2. Szukaj na wszystkich stronach serwisu

t1=0.117, t2=0, t3=0, t4=0.019, t=0.117

Dla sprzedawców

copyright © 2005-2017 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER