Minggu, 09 Februari 2014

Wow! eBook: Emerging Trends in ICT Security - 5 new eBooks


Wow! eBook: Emerging Trends in ICT Security - 5 new eBooks

Link to Wow! eBook

Emerging Trends in ICT Security

Posted: 09 Feb 2014 07:29 AM PST

Book Description

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider’s look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.

  • Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures
  • Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks
  • Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing

Table of Contents
PART 1: INFORMATION AND SYSTEMS SECURITY
SECTION 1: Theory/Reviews of the field
Chapter 1. System Security Engineering for Information Systems
Chapter 2. Metrics and Indicators as Key Organizational Assets for ICT Security Assessment
Chapter 3. A Fresh Look at Semantic Natural Language Information Assurance and Security

SECTION 2: Methods
Chapter 4. An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications
Chapter 5. Gamification of Information Security Awareness Training
Chapter 6. A Conceptual Framework for Information Security Awareness, Assessment, and Training
Chapter 7. Security Projects for Systems and Networking Professionals

SECTION 3: Case study
Chapter 8. Assessing the Role of Governments in Securing E-Business

PART 2: NETWORK AND INFRASTRUCTURE SECURITY
SECTION 4: Theory Reviews of the field
Chapter 9. A Survey of Quantum Key Distribution (QKD) Technologies
Chapter 10. Advances in Self-Security of Agent-Based Intrusion Detection Systems
Chapter 11. Secure Communication in Fiber-Optic Networks

SECTION 5: Methods
Chapter 12. Advanced Security Network Metrics
Chapter 13. Designing Trustworthy Software Systems Using the NFR Approach
Chapter 14. Analyzing the Ergodic Secrecy Rates of Cooperative Amplify-and-Forward Relay Networks over Generalized Fading Channels
Chapter 15. Algebraic Approaches to a Network-Type Private Information Retrieval
Chapter 16. Using Event Reasoning for Trajectory Tracking
Chapter 17. Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Chapter 18. Real-time Network Intrusion Detection Using Hadoop-Based Bayesian Classifier
Chapter 19. Optimum Countermeasure Portfolio Selection
Chapter 20. CSRF and Big Data
Chapter 21. Security through Emulation-Based Processor Diversification
Chapter 22. On the Use of Unsupervised Techniques for Fraud Detection in VoIP Networks

PART 3: MOBILE AND CLOUD COMPUTING
SECTION 6: Reviews of the field
Chapter 23. Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed Provisioned Cloud Infrastructure

SECTION 7: Methods
Chapter 24. Detection of Intent-Based Vulnerabilities in Android Applications

PART 4: CYBER CRIME AND CYBER TERRORISM
SECTION 8: Theory
Chapter 25. A Quick Perspective on the Current State in Cybersecurity
Chapter 26. A Paradigm Shift in Cyberspace Security

SECTION 9: Methods
Chapter 27. Counter Cyber Attacks By Semantic Networks
Chapter 28. Man-in-the-Browser Attacks in Modern Web Browsers
Chapter 29. Improving Security in Web Sessions
Chapter 30. Leveraging Semantic Web Technologies for Access Control
Chapter 31. Cyber Security Education

SECTION 10: Case study
Chapter 32. Surveillance without Borders

PART 5: FOCUS TOPICS: FROM ONLINE RADICALISATION TO ONLINE FINANCIAL CRIME
SECTION 11: Theory
Chapter 33. A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals
Chapter 34. Preventing Terrorism Together

SECTION 12: Methods
Chapter 35. Investigating Radicalized Individual Profiles through Fuzzy Cognitive Maps
Chapter 36. Financial Security against Money Laundering
Chapter 37. Intelligent Banking XML Encryption Using Effective Fuzzy Logic

Book Details

  • Hardcover: 650 pages
  • Publisher: Morgan Kaufmann; 1 edition (November 2013)
  • Language: English
  • ISBN-10: 0124114741
  • ISBN-13: 978-0124114746
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Emerging Trends in ICT Security appeared first on Wow! eBook.

Visual Computing for Medicine, 2nd Edition

Posted: 09 Feb 2014 07:14 AM PST

Book Description

Visual Computing for Medicine, Second Edition, offers cutting-edge visualization techniques and their applications in medical diagnosis, education, and treatment. The book includes algorithms, applications, and ideas on achieving reliability of results and clinical evaluation of the techniques covered. Preim and Botha illustrate visualization techniques from research, but also cover the information required to solve practical clinical problems. They base the book on several years of combined teaching and research experience. This new edition includes six new chapters on treatment planning, guidance and training; an updated appendix on software support for visual computing for medicine; and a new global structure that better classifies and explains the major lines of work in the field.

  • Complete guide to visual computing in medicine, fully revamped and updated with new developments in the field
  • Illustrated in full color
  • Includes a companion website offering additional content for professors, source code, algorithms, tutorials, videos, exercises, lessons, and more

Table of Contents
Chapter 1. Introduction

Part I. Acquisition, Analysis, and Interpretation of Medical Volume Data
Chapter 2. Acquisition of Medical Image Data
Chapter 3. An Introduction to Medical Visualization in Clinical Practice
Chapter 4. Image Analysis for Medical Visualization
Chapter 5. Human-Computer Interaction for Medical Visualization

Part II: Visualization and Exploration of Medical Volume Data
Chapter 6. Surface Rendering
Chapter 7. Direct Volume Visualization
Chapter 8. Advanced Direct Volume Visualization
Chapter 9. Volume Interaction
Chapter 10. Labeling and Measurements in Medical Visualization

Part III: Advanced Medical Visualization Techniques
Chapter 11. Visualization of Vascular Structures
Chapter 12. Illustrative Medical Visualization
Chapter 13. Virtual Endoscopy
Chapter 14. Projections and Reformations

Part IV: Visualization of High-Dimensional Medical Image Data
Chapter 15. Visualization of Brain Connectivity
Chapter 16. Visual Exploration and Analysis of Perfusion Data

Part V: Treatment Planning, Guidance and Training
Chapter 17. Computer-Assisted Surgery
Chapter 18. Image-Guided Surgery and Augmented Reality
Chapter 19. Visual Exploration of Simulated and Measured Flow Data
Chapter 20. Visual Computing for ENT Surgery Planning – ONLINE
Chapter 21. Computer-Assisted Medical Education – ONLINE
Chapter 22. Outlook – ONLINE

Book Details

  • Hardcover: 836 pages
  • Publisher: Morgan Kaufmann; 2nd Edition (November 2013)
  • Language: English
  • ISBN-10: 0124158730
  • ISBN-13: 978-0124158733
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Visual Computing for Medicine, 2nd Edition appeared first on Wow! eBook.

Enterprise Applications Administration

Posted: 09 Feb 2014 07:05 AM PST

Book Description

Enterprise Applications Administration prepares you for the full breadth of work associated with administering large enterprise applications. This book provides essential information on tasks such as operating systems administration, network design, system architecture, project planning, working within a team, protecting the network, and how to keep applications up and running. The book effectively bridges the gap between what is taught in the technology-specific literature and the real world of enterprise application administrators.

  • Provides a general understanding of all key knowledge areas needed by enterprise application administrators
  • Bridges the gap between technology-specific literature and the actual work being performed by enterprise application administrators
  • Shows how to define and standardize processes and documentation to make enterprise application administration easier and more consistent

Table of Contents
Chapter 1. Introduction to Enterprise Applications Administration
Chapter 2. Networks
Chapter 3. Servers
Chapter 4. Databases
Chapter 5. Information Security
Chapter 6. Architecture
Chapter 7. Enterprise Applications Administration Teams
Chapter 8. Automation and Monitoring
Chapter 9. Documentation

Book Details

  • Paperback: 400 pages
  • Publisher: Morgan Kaufmann (December 2013)
  • Language: English
  • ISBN-10: 0124077730
  • ISBN-13: 978-0124077737
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Enterprise Applications Administration appeared first on Wow! eBook.

The Moderator’s Survival Guide

Posted: 09 Feb 2014 07:01 AM PST

Book Description

The Moderator’s Survival Guide is your indispensable resource for navigating the rocky shoals of your one-on-one user research sessions. Inside, you’ll find guidance for nearly 100 diverse situations (ranging from business-as-usual to tricky and sticky) that might occur during usability studies, contextual inquiries, or user interviews.

As a moderator, you are responsible for the well-being of the participant, your study, and your organization. You must be prepared for anything that may happen, from your technology failing to the participant quailing. Use this guide to identify your best next steps, react appropriately, and survive any challenges that comes your way.

  • Practical, field-tested, and actionable tips for what to do and say-and what NOT to do or say-in each situation.
  • Key patterns and extensive examples to sharpen your approach to the commonplace and prepare you for the unlikely.
  • Illustrative “survival stories” contributed by numerous professionals on the front lines of user research.

Table of Contents
Part 1: Your Moderation Toolkit
Chapter 1. Moderation Matters: Power, Responsibility, and Style
Chapter 2. In the Trenches: Six Steps for Handling Situations
Chapter 3. Mix and Match: Your Moderation Patterns Toolbox

Part 2: Your Survival Guide
Chapter 4. Recruiting Mishaps: Participants You Weren’t Expecting
Chapter 5. Participant Misconceptions: Not What the Participant was Expecting.
Chapter 6. Some Guidance Required: Participants in Need of Shepherding.
Chapter 7. Make it Work: Handling Technical Obstacles
Chapter 8. Is This Right? Responding to Uncertain Participants.
Chapter 9. What’s Going On? Recovering from External Interruptions.
Chapter 10. Get on Track: Overcoming Momentum Blockers.
Chapter 11. Take the Wheel: Guiding Wayward Participants.
Chapter 12. A Delicate Touch: Addressing Sensitive Situations
Chapter 13. Uncomfortable Interactions: Responding to Awkward Situations
Chapter 14. Safety First: Minimizing Emotional and Physical Distress

Part 3: Improving Your Skills
Chapter 15. An Ounce of Prevention: Avoiding and Mitigating Situations
Chapter 16. Sharpening Steel: How to Improve Your Skills and Help Others Improve Theirs

Appendix A. What to Say
Appendix B. Preparing for a Successful Session
Appendix C. Resources

Book Details

  • Paperback: 364 pages
  • Publisher: Morgan Kaufmann (November 2013)
  • Language: English
  • ISBN-10: 0124047009
  • ISBN-13: 978-0124047006
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post The Moderator’s Survival Guide appeared first on Wow! eBook.

The Digital Crown

Posted: 09 Feb 2014 06:57 AM PST

Book Description

In 1997, Bill Gates famously said “Content is king.” Since then, the digital marketing world has been scrambling to fulfil this promise, as we finally shift our focus to what consumers really want from our brands: a conversation.The Digital Crown walks you through the essentials of crafting great content: the fundamentals of branding, messaging, business goal alignment, and creating portable, mobile content that is future-ready. Systems create freedom, and within this book you’ll learn the seven critical rules to align your internal and external content processes, including putting your audience first, involving stakeholders early and often, and creating multidisciplinary content teams.

Complete with cases studies and experience drawn directly from global content projects, you are invited to observe the inner workings of successful content engagements. You’ll learn how to juggle the demands of IT, design, and content teams, while acquiring all the practical tools you need to devise a roadmap for connecting and engaging with your customers.

This is your next step on the journey to creating and managing winning content to engage your audience and keep them coming back for more.

  • Discover easy-to-follow, simple breakdowns of the major ideas behind engaging with your customer
  • Learn both the theoretical and practical applications of content and communication on-line
  • Maximize on the case studies and real-world examples, enabling you to find the best fit for your own business

Table of Contents
Part 1: Content is a Conversation
Chapter 1. Understanding Branding, Content Strategy and Content Marketing

Part 2: Content Floats
Chapter 3. Constructing the Conversation
Chapter 4. Publishing Content for Everywhere
Chapter 5. Engagement Strategies

Part 3: Effective Content Strategy: People and Process
Chapter 6. Understand your Customers
Chapter 7. Frame Your Content
Chapter 8. The Content Strategists’ Toolbox

Part 4: Content Marketing. Now You Get To Talk
Chapter 9. Content Marketing Sustains the Conversation
Chapter 10. The Dream Content Team
Chapter 11. Talking about Design

Book Details

  • Paperback: 358 pages
  • Publisher: Morgan Kaufmann (November 2013)
  • Language: English
  • ISBN-10: 0124076742
  • ISBN-13: 978-0124076747
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post The Digital Crown appeared first on Wow! eBook.

Tidak ada komentar:

Posting Komentar