Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...
I suspected something was wrong with the “facts of life” as they were presented to me when I was a kid. Sure, I then spent a little over thirty years trying to be “normal” and make that square peg fit the round hole, “looking for a reason to believe.” But then there was a memorable day when I finally grew up and...
Welcome to Learning Quartz Composer! We guarantee this will be the most fun geek book you have read, and by the end your digital world will be a better-looking place. Whether you dream of live visuals, interactive installations, Cocoa apps, dashboard widgets, or extra awesomeness for your film and motion...
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...
This book is not a reference. That needs to be said right off the bat. It was written to be read cover to cover; it tells a story. It's an interwoven tale about object-oriented programming in the .NET world: building objects, moving them, and using them around the world. This is not just a how-to book; it's a why-to and a when-to...
Congratulations—you’ve purchased the new iPhone 4, the coolest smartphone on the market. Now it’s time to learn how to take advantage of all the features, apps, and secret techniques available. To accomplish this, look no further than iPhone 4 Made Simple. Over 1,000 screen visuals and clear-cut instructions guide...
I’ll tell you a secret. One that my friends and family mostly know about, and many people who meet me eventually figure out. But it is one of those slightly embarrassing secrets – one that I don’t usually just tell people when I meet them for the first time. But you’re going to be my friend for the next 300 pages, so...
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the...
In the vein of Neil Strauss’ The Game and Joshua Foer’s Moonwalking with Einstein comes the fascinating story of one man’s colorful, mysterious, and personal journey into the world of magic, and his unlikely invitation into an underground secret society of revolutionary magicians from...
Agility and Execution – Organizational Success Through Flexible Business Processes
Only a company which is flexible, agile and responsive will be successful. The secret to success is agility, meaning the ability to quickly adapt company processes. Against this backdrop, IT is of particular importance as it is virtually the machine...
Coaching as a field has mushroomed in recent years. Thousands of new coaches enter the field after only completing short and superficial training programmes. The problem with this is that coaching is not i) something you can simply learn in a short programme ii) a superficial practice.
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...