Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


1. 

Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in Cybersecurity

By: Sumeet Dua; Xian Du

Publisher: Auerbach Publications

Publication Date: 25-APR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, this book provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals, surveys contemporary challenges, and details cutting-edge machine learning and data mining techniques. This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures and more than 40 case studies...

2. 

FISMA Principles and Best Practices: Beyond Compliance

FISMA Principles and Best Practices: Beyond Compliance

By: Patrick Howard

Publisher: Auerbach Publications

Publication Date: 29-MAR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Detailing a proven approach for establishing and implementing a comprehensive information security program, this book integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with Federal Information Security Management Act (FISMA) requirements. Based on the author’s experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, the book provides workable solutions for establishing and operating an effective security compliance program....

3. 

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

By: Tyson Macaulay; Bryan Singer

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are...

4. 

Mobile Opportunistic Networks: Architectures, Protocols and Applications

Mobile Opportunistic Networks: Architectures, Protocols and Applications

By: Mieso Denko

Publisher: Auerbach Publications

Publication Date: 26-MAY-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest...

5. 

Information Security Governance Simplified: From the Boardroom to the Keyboard

Information Security Governance Simplified: From the Boardroom to the Keyboard

By: Todd Fitzgerald

Publisher: CRC Press

Publication Date: 20-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is protected and examines all positions from the board of directors to the end user, delineating the role each plays in protecting the security of the organization. ...

6. 

Information Security Management Handbook, Sixth Edition, Volume 5

Information Security Management Handbook, Sixth Edition, Volume 5

By: Nozaki, Krause; Harold Tipton

Publisher: Auerbach Publications

Publication Date: 13-SEP-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Updated annually to keep up with the increasingly fast pace of change in the field, the <EM>Information Security Management Handbook</EM> is the single most comprehensive and up-to-date resource on information security and assurance. Compiling the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, <EM>Sixth Edition, Volume 5</EM> reflects the latest changes to information security and the CISSP<SUP>® </SUP>Common Body of Knowledge (CBK<SUP>®</SUP>). This edition updates the benchmark Volume 1 with a...

7. 

Targeted Cyber Attacks

Targeted Cyber Attacks

By: Aditya Sood; Richard Enbody

Publisher: Syngress

Publication Date: 18-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed...

8. 

Wireless Body Area Networks: Technology, Implementation, and Applications

Wireless Body Area Networks: Technology, Implementation, and Applications

By: Mehmet Yuce; Jamil Khan

Publisher: Pan Stanford Publishing

Publication Date: 06-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN...

9. 

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

By: Frank Siepmann

Publisher: Auerbach Publications

Publication Date: 09-DEC-2013

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book explains how to address the risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book provides the fundamental understanding and guidance readers need to keep information, processes,...

10. 

Security De-Engineering: Solving the Problems in Information Risk Management

Security De-Engineering: Solving the Problems in Information Risk Management

By: Ian Tibble

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

With organizations facing growing security challenges from both automated and manual attacks, these incidents now represent more of a threat to the bottom line than ever before. This book explains the problems in corporate information security and how to solve them. Based on more than a decade of global experience, the author explains how the industry has faltered and how a gradual decline in analytical skills has led the corporate world on a disastrous collision course with automated malware attacks and manual intrusions. ...

11. 

IP Telephony Interconnection Reference: Challenges, Models, and Engineering

IP Telephony Interconnection Reference: Challenges, Models, and Engineering

By: Mohamed Boucadair; Isabel Borges; Pedro Neves; Olafur Einarsson

Publisher: CRC Press

Publication Date: 04-NOV-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Written to address the growth of IP telephony service offerings within the corporate and residential realm, this book discusses technical and regulatory issues related to IP Telephony Interconnection. It describes business and interconnection models and solutions, and provides an overview of emerging architectures such as IMS and TISPAN. The authors offer a detailed overview of the SPPEERMINT activity and proposed architecture, the current work undertaken in DRINKS, the use of ENUM for interconnection, and ENUM implementation status, among others. This text is a first of its kind to offer...

12. 

Communication Architectures for Systems-on-Chip

Communication Architectures for Systems-on-Chip

By: José Ayala

Publisher: CRC Press

Publication Date: 14-MAR-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book covers the current communication architectures that are implemented in manufactured systems-on-chip, as well as those that are being proposed to overcome the existing limitations. The text addresses well-established communication buses and less-common networks on chip, along with modern technologies that propose the use of carbon nano tubes and optical links to speed up data transfer and increase both security levels and quality of service. Contributors address on-chip transaction security involving critical information and the mechanisms to protect from an external attack,...

13. 

Advanced Windows RT Memory Dump Analysis: ARM Version

Advanced Windows RT Memory Dump Analysis: ARM Version

By: 

Publisher: OpenTask

Publication Date: 18-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The full transcript of Software Diagnostics Services training with 9 step-by-step exercises. Learn how to navigate through memory dump space and Windows data structures to perform memory forensics, troubleshoot and debug complex software incidents. The training uses a unique and innovative pattern-driven analysis approach to speed up the learning curve. It consists of practical step-by-step exercises using WinDbg to diagnose structural and behavioural patterns in Windows RT kernel and complete (physical) memory dumps. Additional topics include memory search, kernel linked list navigation,...

14. 

Managing Trust in Cyberspace

Managing Trust in Cyberspace

By: Sabu Thampi; Bharat Bhargava; Pradeep Atrey

Publisher: Chapman and Hall/CRC

Publication Date: 14-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Bringing together cross-disciplinary expertise, this illustrated, tutorial-style text addresses fundamentals underpinning computational trust models and covers trust management processes for dynamic open systems and applications. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book walks through online identity management, examines using trust and argumentation in recommender...

15. 

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications

By: Xiangyun Zhou; Lingyang Song; Yan Zhang

Publisher: CRC Press

Publication Date: 15-NOV-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in...

16. 

Improving the Performance of Wireless LANs: A Practical Guide

Improving the Performance of Wireless LANs: A Practical Guide

By: Nurul Sarkar

Publisher: Chapman and Hall/CRC

Publication Date: 08-JAN-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book quantifies the key factors of WLAN performance and describes methods for improvement. It provides theoretical background and empirical results for the optimum planning and deployment of indoor WLAN systems, explaining the fundamentals while supplying guidelines for design, modeling, and performance evaluation. It discusses environmental effects on WLAN systems, protocol redesign for routing and MAC, and traffic distribution; examines emerging and future network technologies; and includes radio propagation and site measurements, simulations for various network design scenarios,...

17. 

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

By: Douglas Landoll

Publisher: CRC Press

Publication Date: 20-MAY-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Picking up where the bestselling first edition left off, this second edition explains how to conduct an effective risk assessment. Supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting, it provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence. Trusted to assess security for leading organizations and government agencies, including the CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals...

18. 

Near Field Communication

Near Field Communication

By: Sheli McHugh; Kristen Yarmey

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 11-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Near Field Communication is a radio frequency technology that allows objects, such as mobile phones, computers, tags, or posters, to exchange information wirelessly across a small distance. This report on the progress of Near Field Communication reviews the features and functionality of the technology and summarizes the broad spectrum of its current and anticipated applications. We explore the development of NFC technology in recent years, introduce the major stakeholders in the NFC ecosystem, and project its movement toward mainstream adoption. Several examples of early implementation of NFC...

19. 

Kali Linux – Assuring Security by Penetration Testing

Kali Linux – Assuring Security by Penetration Testing

By: Tedi Heriyanto; Lee Allen; Shakeel Ali

Publisher: Packt Publishing

Publication Date: 07-APR-2014

Insert Date: 10-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Master the art of penetration testing Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing...

20. 

Telecommunication Network Economics

Telecommunication Network Economics

By: Patrick Maillé; Bruno Tuffin

Publisher: Cambridge University Press

Publication Date: 28-FEB-2014

Insert Date: 05-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Presenting a balance of theory and practice, this up-to-date guide provides a comprehensive overview of the key issues in telecommunication network economics, as well as the mathematical models behind the solutions. These mathematical foundations enable the reader to understand the economic issues arising at this pivotal time in network economics, from business, research and political perspectives. This is followed by a unique practical guide to current topics, including app stores, volume-based pricing, auctions for advertisements, search engine business models, the network neutrality...