Over the last few decades, unprecedented global population growth has led to increased demand for food and shelter. At the same time, extraction of natural resources beyond the Earth’s resilience capacity has had a devastating effect on ecosystems and environmental health. Furthermore, climate change is having a significant...
We live in the information age, where swift access to relevant information in whatever form or medium can dictate the success or failure of businesses or individuals. The timely provision of relevant information with minimal ‘noise' is critical to modern society and this is what information retrieval (IR) is all about. It is a dynamic...
Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.
"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing...
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!
It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that...
This practical guide provides a comprehensive overview of professionally managed assets, or investments in which all portfolio decisions and rebalancing are delegated to a fund manager or third-party advice service. Savvy investors looking to achieve a better understanding of the nuances, benefits, and drawbacks of using these...
When we, the authors of this book, first learned what Microsoft’s plans were for Analysis Services in the SQL Server 2012 release, we were not happy. Analysis Services hadn’t acquired much in the way of new features since 2005, even though in the meantime it had grown to become the biggest-selling OLAP tool. It seemed as...
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...
Constructing Measures introduces a way to understand the advantages and disadvantages of measurement instruments, how to use such instruments, and how to apply these methods to develop new instruments or adapt old ones. The book is organized around the steps taken while constructing an instrument. It opens with a summary of the...
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...