Terminal Alice

Terminal Alice
Author :
Publisher :
Total Pages : 0
Release :
ISBN-10 : 0983040486
ISBN-13 : 9780983040484
Rating : 4/5 (86 Downloads)

Synopsis Terminal Alice by : Zenescope Entertainment Staff

Alex, Laura, Illena, Cara, and Eve (ALICE), are five female contract killers forced to work together to stay alive and cancel the million dollar bounties placed on each of their heads. With a body count almost equaling the page count, Terminal Alice''s barrier free combination of sex, violence, and intrigue will keep you guessing until the final page. Who says you can''t go with a smile.

Elementary Information Security

Elementary Information Security
Author :
Publisher : Jones & Bartlett Publishers
Total Pages : 888
Release :
ISBN-10 : 9781284055931
ISBN-13 : 1284055930
Rating : 4/5 (31 Downloads)

Synopsis Elementary Information Security by : Richard E. Smith

An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with recently reported cyber security incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Second Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.

Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications
Author :
Publisher : Springer
Total Pages : 388
Release :
ISBN-10 : 9780387355283
ISBN-13 : 0387355286
Rating : 4/5 (83 Downloads)

Synopsis Smart Card Research and Advanced Applications by : Josep Domingo-Ferrer

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Elementary Information Security, Fourth Edition

Elementary Information Security, Fourth Edition
Author :
Publisher : Jones & Bartlett Learning
Total Pages : 819
Release :
ISBN-10 : 9781284282801
ISBN-13 : 1284282805
Rating : 4/5 (01 Downloads)

Synopsis Elementary Information Security, Fourth Edition by : Peter H. Gregory

Elementary Information Security is designed for an introductory course in cybersecurity, namely first or second year undergraduate students. This essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems. Designed to fulfill curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination.

Dark Station

Dark Station
Author :
Publisher : Brett P. S.
Total Pages : 32
Release :
ISBN-10 :
ISBN-13 :
Rating : 4/5 ( Downloads)

Synopsis Dark Station by : Brett P. S.

An orbital station goes dark and desperate hands enlist the aid of Gebbley and his mates before thieves or worse can lay claim to its secrets. As the crew enters empty halls, they wonder what grim fate befell those who came before.

The Hive Construct

The Hive Construct
Author :
Publisher : Random House
Total Pages : 354
Release :
ISBN-10 : 9781448171019
ISBN-13 : 1448171016
Rating : 4/5 (19 Downloads)

Synopsis The Hive Construct by : Alexander Maskill

Situated deep in the Sahara Desert, New Cairo is a city built on technology – from the huge, life-giving solar panels that keep it functioning in a radically changed, resource-scarce world to the artificial implants that have become the answer to all and any of mankind's medical problems. But it is also a divided city, dominated by a handful of omnipotent corporate dynasties. And when a devastating new computer virus begins to spread through the poorest districts, shutting down the life-giving implants that enable so many to survive, the city begins to slide into the anarchy of violent class struggle. Hiding amidst the chaos is Zala Ulora. A gifted hacker and fugitive from justice, she believes she might be able to earn her life back by tracing the virus to its source and destroying it before it destroys the city. Or before the city destroys itself . . . With its vivid characters, bold ideas and explosive action, The Hive is science fiction at its most exciting, inventive and accessible.

Federal Register

Federal Register
Author :
Publisher :
Total Pages : 880
Release :
ISBN-10 : UCR:31210024905570
ISBN-13 :
Rating : 4/5 (70 Downloads)

Synopsis Federal Register by :

Active ADP Systems/applications

Active ADP Systems/applications
Author :
Publisher :
Total Pages : 60
Release :
ISBN-10 : PURD:32754076144439
ISBN-13 :
Rating : 4/5 (39 Downloads)

Synopsis Active ADP Systems/applications by : United States. Veterans Administration. Reporting Policy and Review Service

Water Terminal and Transfer Facilities

Water Terminal and Transfer Facilities
Author :
Publisher :
Total Pages : 2598
Release :
ISBN-10 : UOM:39015068347460
ISBN-13 :
Rating : 4/5 (60 Downloads)

Synopsis Water Terminal and Transfer Facilities by : United States. Army. Corps of Engineers

A Handbook of Ethical Practice

A Handbook of Ethical Practice
Author :
Publisher : Elsevier
Total Pages : 172
Release :
ISBN-10 : 9781780631028
ISBN-13 : 1780631022
Rating : 4/5 (28 Downloads)

Synopsis A Handbook of Ethical Practice by : David McMenemy

This book looks at all of the ethical issues facing information and library professionals in one overarching, and practically-focused, text. As such, it is of great benefit to both practitioners and to LIS students. The focus of the book is two-fold: (1) It contains a detailed discussion of the issues that impact on the day-today practice of information workers in the 21st century; and (2) contains case studies discussing potential solutions to ethical problems faced. The book provides sections which work like flowcharts leading from ethical issues through decision points to proposed solutions based on the literature/case studies. This is a highly useful resource that provides appropriate access to potential solutions for day-to-day queries. - Despite the coverage of ethical issues in books on copyright, freedom of information, public internet access, and data protection, this book fills the gap in drawing all of this information together, as one sourcebook - The book can be used for regular reference - Does not offer legal advice per se, but explains the various scenarios that have been utilised for different ethical problems in the workplace