Rogue Code

Rogue Code
Author :
Publisher : Macmillan
Total Pages : 398
Release :
ISBN-10 : 9781250035370
ISBN-13 : 1250035376
Rating : 4/5 (70 Downloads)

Synopsis Rogue Code by : Mark Russinovich

"Cyber security expert Jeff Aiken knows that no computer system is secure. When he's called to investigate a possible breach of the New York Stock Exchange, he discovers that not only has their system been infiltrated but that those in charge knew about it. Yet for some reason, they allowed the hackers to steal millions of dollars from accounts without trying to stop the theft. When Jeff uncovers the crime, they suddenly turn on him. Accused of grand larceny, Jeff must find and expose the criminals not just to prove his innocence but to stop a billion-dollar heist that could upend the U.S. economy. Praised for his combination of real-world technology and sharp action, Mark Russinovich delivers a thriller about a cyber threat that seems all-too-possible"--

Code 44

Code 44
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : 1734200456
ISBN-13 : 9781734200454
Rating : 4/5 (56 Downloads)

Synopsis Code 44 by : S. D. Crockett

In the year 2029, people are allowing neural implants known as chips to be inserted into their foreheads. Marketed as a medical device that will prevent disease and provide health benefits, the chip also tracks everything we see and do. In an Internet of Things world, the chip is celebrated for curing disease and creating unlimited virtual realities. An underground resistance group is working to expose a government plan designed to hack into citizens' brains via the chip and control their thoughts. The group recruits Nick Winston, a young tech executive, to go undercover in the government's newest agency, BrainShare, and find evidence that will expose the truth. Nick slowly descends into a whistleblower's worst nightmare, walking a dangerous tightrope-each action becoming a choice to save his own life or save his society.Code 44 thrusts us into a dystopian future, not too far off, where the merging of man and machine unravels to show how the subtle erosion of a free society creates the ultimate fight between individual privacy and the national good.

Zero Day

Zero Day
Author :
Publisher : Macmillan
Total Pages : 327
Release :
ISBN-10 : 9781429968041
ISBN-13 : 1429968044
Rating : 4/5 (41 Downloads)

Synopsis Zero Day by : Mark Russinovich

An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today---it's a cataclysmic disaster just waiting to happen.

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK
Author :
Publisher : CRC Press
Total Pages : 1283
Release :
ISBN-10 : 9781482262766
ISBN-13 : 1482262762
Rating : 4/5 (66 Downloads)

Synopsis Official (ISC)2 Guide to the CISSP CBK by : Adam Gordon

As a result of a rigorous, methodical process that (ISC) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC) conducts this process on a regular basis to ensure that the examinations and

Trusted Computing Platforms

Trusted Computing Platforms
Author :
Publisher : Springer Science & Business Media
Total Pages : 246
Release :
ISBN-10 : 9780387239170
ISBN-13 : 0387239170
Rating : 4/5 (70 Downloads)

Synopsis Trusted Computing Platforms by : Sean W. Smith

From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security Including real case study experience with security architecture and applications on multiple types of platforms. Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform. Examines more recent cutting-edge experimental work in this area. Written for security architects, application designers, and the general computer scientist interested in the evolution and use of this emerging technology.

NET Security and Cryptography

NET Security and Cryptography
Author :
Publisher : Prentice Hall Professional
Total Pages : 500
Release :
ISBN-10 : 013100851X
ISBN-13 : 9780131008519
Rating : 4/5 (1X Downloads)

Synopsis NET Security and Cryptography by : Peter Thorsteinson

Learn how to make your .NET applications secure! Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. NET Security and Cryptography is a practical and comprehensive guide to implementing both the security and the cryptography features found in the .NET platform. The authors provide numerous clear and focused examples in both C# and Visual Basic .NET, as well as detailed commentary on how the code works. They cover topics in a logical sequence and context, where they are most relevant and most easily understood. All of the sample code is available online at . This book will allow developers to: Develop a solid basis in the theory of cryptography, so they can understand how the security tools in the .NET Framework function Learn to use symmetric algorithms, asymmetric algorithms, and digital signatures Master both traditional encryption programming as well as the new techniques of XML encryption and XML signatures Learn how these tools apply to ASP.NET and Web Services security

Mindprint, the subconscious art code

Mindprint, the subconscious art code
Author :
Publisher : Lulu.com
Total Pages : 274
Release :
ISBN-10 : 9780620596855
ISBN-13 : 0620596856
Rating : 4/5 (55 Downloads)

Synopsis Mindprint, the subconscious art code by : Edmond Furter

Visual archetypes are the DNA of culture. In artefacts and artworks, where archaeo-astronomers see ancient star maps, archaeologists see cultural traditions, and anthropologists see initiation secrets, appear a standard sequence of types, on an axial grid. Structural archaeology uses constellations as myth maps to find the structure of our perception. All inspired artists, in the Stone, Ice, Bronze and Iron Ages; Babylonians, Egyptians, Chinese, Celts, Mayans, Vikings and moderns, subconsciously express mindprint, our eternal artefact. The sixteen clusters of attributes are demonstrated in 200 examples of famous art and rock art works from every continent and culture. Archetypes are statistically proven, and their 'camouflage' is explained in terms of archaeology, anthropology, art history, psychology, philosophy, archaeo-astronomy, esoterica and spirituality. Readers will never look at art, artists or culture as a cumulative, learned or evolved craft again.

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK
Author :
Publisher : CRC Press
Total Pages : 1008
Release :
ISBN-10 : 9781466554023
ISBN-13 : 1466554029
Rating : 4/5 (23 Downloads)

Synopsis Official (ISC)2 Guide to the CISSP CBK by : Steven Hernandez CISSP

With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation, violating a consumer's privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to da

Lift Cookbook

Lift Cookbook
Author :
Publisher : "O'Reilly Media, Inc."
Total Pages : 256
Release :
ISBN-10 : 9781449365073
ISBN-13 : 1449365078
Rating : 4/5 (73 Downloads)

Synopsis Lift Cookbook by : Richard Dallaway

Annotation If you need help building web applications with the Lift framework, this cookbook provides scores of concise, ready-to-use code solutions. Youll find recipes for everything from setting up a coding environment to creating REST web services and deploying your application to production. Built on top of the Scala JVM programming language, Lift takes a differentyet ultimately easierapproach to development than MVC frameworks such as Rails. Each recipe in this book includes a discussion of how and why each solution works, not only to help you complete the task at hand, but also to illustrate how Lift works. Set up an environment and run your first Lift applicationGenerate HTML, using Lifts View First approachSubmit forms and work with form elementsBuild REST web services with the frameworks RestHelper traitTake advantage of Lifts support for Ajax and CometGet examples for modifying Lifts request pipelineConvert Scala classes into tables, rows, and columns in a relational databaseSend email, call URLs, and schedule tasks from your applicationPackage and deploy your application to various hosted services.