Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Information Technology & Software Development


1. 

Official (ISC)2® Guide to the ISSMP® CBK®

Official (ISC)2® Guide to the ISSMP® CBK®

By: (ISC)² Corporate; Harold Tipton

Publisher: Auerbach Publications

Publication Date: 11-APR-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Preparing professionals for certification and job readiness, the Official (ISC)²<SUP>®</SUP> Guide to CISSP<SUP>®</SUP>-ISSMP<SUP>® </SUP>CBK<SUP>®</SUP> supplies a complete overview of the management topics related to information security. It provides for an expanded enterprise model of security and management that delves into project management, risk management, and continuity planning. Facilitating the mastery of the five ISSEP domains required for certification, this book will not only help you prepare for the CISSP-ISSMP certification exam, but also provide you with a solid foundation...

2. 

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

By: Tyson Macaulay; Bryan Singer

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are...

3. 

Mobile Opportunistic Networks: Architectures, Protocols and Applications

Mobile Opportunistic Networks: Architectures, Protocols and Applications

By: Mieso Denko

Publisher: Auerbach Publications

Publication Date: 26-MAY-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest...

4. 

Information Security Governance Simplified: From the Boardroom to the Keyboard

Information Security Governance Simplified: From the Boardroom to the Keyboard

By: Todd Fitzgerald

Publisher: CRC Press

Publication Date: 20-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is protected and examines all positions from the board of directors to the end user, delineating the role each plays in protecting the security of the organization. ...

5. 

Distributed Systems Architecture

Distributed Systems Architecture

By: Arno Puder; Kay Römer; Frank Pilhofer

Publisher: Morgan Kaufmann

Publication Date: 18-APR-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the applications programmer. It focuses on the use of open source solutions for creating middleware and the tools for developing distributed applications. The design principles presented are universal and apply to all middleware platforms, including CORBA...

6. 

Information Security Management Handbook, Sixth Edition, Volume 5

Information Security Management Handbook, Sixth Edition, Volume 5

By: Nozaki, Krause; Harold Tipton

Publisher: Auerbach Publications

Publication Date: 13-SEP-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Updated annually to keep up with the increasingly fast pace of change in the field, the <EM>Information Security Management Handbook</EM> is the single most comprehensive and up-to-date resource on information security and assurance. Compiling the fundamental skills, techniques, tools, and understanding required of IT security professionals, the Information Security Management Handbook, <EM>Sixth Edition, Volume 5</EM> reflects the latest changes to information security and the CISSP<SUP>® </SUP>Common Body of Knowledge (CBK<SUP>®</SUP>). This edition updates the benchmark Volume 1 with a...

7. 

COSMIC Function Points: Theory and Advanced Practices

COSMIC Function Points: Theory and Advanced Practices

By: Reiner Dumke; Alain Abran

Publisher: Auerbach Publications

Publication Date: 03-FEB-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Designed to conform to the ISO/IEC standard 14143, the Common Software Measurement International Consortium (COSMIC) Function Point method has become the major estimation technique based on international standards for building software-intensive systems. This book supplies a cutting-edge look at current and emerging practices in the international software measurement community. An international panel of experts details the steps for measuring the functional size of software and developing project estimates with improved accuracy. ...

8. 

CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120

CCNA Routing and Switching Review Guide: Exams 100-101, 200-101, and 200-120

By: 

Publisher: Sybex

Publication Date: 13-JAN-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Todd Lammle's focused, concise review guide, updated for the latest CCNA exams CCNA is one of the most sought after certifications for IT professionals. If you're preparing for the CCNA Routing and Switching certification, this Sybex review guide offers the best quick review available. Organized by exam objective, it's the perfect supplement to other learning tools, including the Sybex CCNA Routing and Switching Study Guide (ISBN: 9781118749616). All exam topics from exams 100-101, 200-101, and 200-120 are thoroughly covered, and additional study materials including bonus exams,...

9. 

Teach Yourself VISUALLY Raspberry Pi

Teach Yourself VISUALLY Raspberry Pi

By: 

Publisher: Visual

Publication Date: 10-FEB-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Full-color, step-by-step guidance for learning to use Raspberry Pi! Raspberry Pi is an inexpensive, single-board computer that serves as an introductory board for students and developing computer professionals. This image-driven, visual guide shows you how the Raspberry Pi can be easily used as a stand-alone computer, a media center, a web server, and much more. Vivid, full-color images bring Raspberry Pi projects to life, while well-illustrated circuit diagrams and step-by-step practical advice cover everything from working with the included software to branching out into typical but...

10. 

Mastering XPages: A Step-by-Step Guide to XPages Application Development and the XSP Language, Second Edition

Mastering XPages: A Step-by-Step Guide to XPages Application Development and the XSP Language, Second Edition

By: Martin Donnelly; Mark Wallace; Tony McGuckin

Publisher: IBM Press

Publication Date: 25-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

IBM's Best-Selling Guide to XPages Development–Now Updated and Expanded for Lotus Notes/Domino 9.0.1 XPages instantly revolutionized Notes/Domino application development, and the newest versions deliver unprecedented performance and flexibility. Now, the popular insider's guide to XPages development has been updated and expanded to reflect all these improvements, through IBM Notes/Domino 9.0.1 and beyond. Three key members of the IBM XPages team have brought together comprehensive knowledge for delivering outstanding solutions. They have added several hundred pages of new content,...

11. 

Targeted Cyber Attacks

Targeted Cyber Attacks

By: Aditya Sood; Richard Enbody

Publisher: Syngress

Publication Date: 18-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed...

12. 

Collaboration with Cloud Computing

Collaboration with Cloud Computing

By: Ric Messier

Publisher: Syngress

Publication Date: 07-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing...

13. 

PIC Microcontroller Projects in C, 2nd Edition

PIC Microcontroller Projects in C, 2nd Edition

By: Dogan Ibrahim

Publisher: Newnes

Publication Date: 08-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Extensively revised and updated to encompass the latest developments in the PIC 18FXXX series, this book demonstrates how to develop a range of microcontroller applications through a project-based approach. After giving an introduction to programming in C using the popular mikroC Pro for PIC and MPLAB XC8 languages, this book describes the project development cycle in full. The book walks you through fully tried and tested hands-on projects, including many new, advanced topics such as Ethernet programming, digital signal processing, and RFid technology. This book is ideal for engineers,...

14. 

Beyond Knowledge Management: What Every Leader Should Know

Beyond Knowledge Management: What Every Leader Should Know

By: Jay Liebowitz

Publisher: Auerbach Publications

Publication Date: 11-NOV-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This concise and easy-to-read book examines 10 areas where Knowledge Management can help an organization gain a competitive advantage. Each chapter opens with an introduction to one of these promising areas, followed by case studies from industry, government, and not-for-profits. The case studies demonstrate how leaders at organizations such as The Coca-Cola Company, e-Bay, PricewaterhouseCoopers, University of Maryland University College, Northrop Grumman, and the U.S. Department of Health and Human Services have used the concepts discussed to improve decision making. ...

15. 

Antipatterns: Managing Software Organizations and People, Second Edition

Antipatterns: Managing Software Organizations and People, Second Edition

By: Colin Neill; Philip Laplante; Joanna DeFranco

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Using real and hypothetical case studies, this book illustrates poor management approaches, unpleasant work environments, and bad manager traits that lead to failure. For each antipattern, the text describes the situation and symptoms, gives examples, and offers a refactoring solution. The authors provide real-world anecdotes that illustrate key concepts. They also include thought-provoking exercises that describe a situation and ask which antipatterns are present, as well as how to refactor the situation. Coverage includes leadership principles, environmental antipatterns, group patterns,...

16. 

Spectral Feature Selection for Data Mining

Spectral Feature Selection for Data Mining

By: Zheng Zhao; Huan Liu

Publisher: Chapman and Hall/CRC

Publication Date: 14-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This timely introduction to spectral feature selection illustrates the potential of this powerful dimensionality reduction technique in high-dimensional data processing. It presents the theoretical foundations of spectral feature selection, its connections to other algorithms, and its use in handling both large-scale data sets and small sample problems. Readers learn how to use spectral feature selection to solve challenging problems in real-life applications and discover how general feature selection and extraction are connected to spectral feature selection. Source code for the...

17. 

Wireless Body Area Networks: Technology, Implementation, and Applications

Wireless Body Area Networks: Technology, Implementation, and Applications

By: Mehmet Yuce; Jamil Khan

Publisher: Pan Stanford Publishing

Publication Date: 06-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN...

18. 

Pig Design Patterns

Pig Design Patterns

By: Pradeep Pasupuleti

Publisher: Packt Publishing

Publication Date: 17-APR-2014

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Simplify Hadoop programming to create complex end-to-end Enterprise Big Data solutions with Pig Quickly understand how to use Pig to design end-to-end Big Data systems Implement a hands-on programming approach using design patterns to solve commonly occurring enterprise Big Data challenges Enhances users’ capabilities to utilize Pig and create their own design patterns wherever applicable In Detail Pig makes Hadoop programming simple, intuitive, and fun to work with. It removes the complexity from Map Reduce programming by giving the programmer immense power through its...

19. 

Rough Cuts
Becoming Functional

Becoming Functional

By: Joshua Backfield

Publisher: O'Reilly Media, Inc.

Publication Date: 15-JUL-2014

Insert Date: 19-APR-2014

Table of Contents • Start Reading

If you have an imperative (and probably object-oriented) programming background, Becoming Functional will help you through the sometimes alien world of functional programming. Many functional programming books begin by focusing on the more difficult concepts such as recursion and immutability. This book lets you dive right in to functional programming by teaching the most useful implementation concepts first....

20. 

C: From Theory to Practice

C: From Theory to Practice

By: George Tselikis; Nikolaos Tselikas

Publisher: CRC Press

Publication Date: 12-FEB-2014

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This easy-to-use, classroom-tested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C. More than 500 exercises and examples of progressive difficulty aid students in understanding all the aspects and peculiarities of the C language. The exercises test students on various levels of programming and the examples enhance their concrete understanding of programming know-how. ...