The recent financial turmoil has raised suspects on investment banks and will certainly reshape the industry. However, the transactions traditionally managed by investment banks will still require the intervention of financial institutions, as always in the past. This book aims at providing an overview of these traditional investment banking...
MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...
In early 2004, DTrace remained nascent; while Mike Shapiro, Adam Leventhal, and I had completed our initial implementation in late 2003, it still had substantial gaps (for example, we had not yet completed user-level instrumentation on x86), many missing providers, and many features yet to...
Digital forensics deals with the acquisition, preservation, examination,
analysis and presentation of electronic evidence. Networked computing,
wireless communications and portable electronic devices have expanded
the role of digital forensics beyond traditional computer crime investigations.
Practically every type of crime now...
SECURITY AND PRIVACY issues with computers and computer networks
are constantly in the news these days, and everyone seems to be concerned
about them to some degree. Businesses everywhere are worried about
having
sensitive customer information such as credit card numbers or email
addresses
stolen,...
Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...
Forty years ago, the age-old battle against infectious diseases as a major threat to human health was believed close to being won. However, by the late twentieth century, the increase of emerging and reemerging infectious diseases was evident in both low and high income countries. About 30 new infectious diseases have been identified in the...
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?
With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...
Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.
About This Book
Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and...
Your all-inclusive guide to Windows 10 Anniversary Edition
Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS....