Rogue Code

Rogue Code
Author :
Publisher : Macmillan
Total Pages : 398
Release :
ISBN-10 : 9781250035370
ISBN-13 : 1250035376
Rating : 4/5 (70 Downloads)

Synopsis Rogue Code by : Mark Russinovich

"Cyber security expert Jeff Aiken knows that no computer system is secure. When he's called to investigate a possible breach of the New York Stock Exchange, he discovers that not only has their system been infiltrated but that those in charge knew about it. Yet for some reason, they allowed the hackers to steal millions of dollars from accounts without trying to stop the theft. When Jeff uncovers the crime, they suddenly turn on him. Accused of grand larceny, Jeff must find and expose the criminals not just to prove his innocence but to stop a billion-dollar heist that could upend the U.S. economy. Praised for his combination of real-world technology and sharp action, Mark Russinovich delivers a thriller about a cyber threat that seems all-too-possible"--

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK
Author :
Publisher : CRC Press
Total Pages : 1283
Release :
ISBN-10 : 9781482262766
ISBN-13 : 1482262762
Rating : 4/5 (66 Downloads)

Synopsis Official (ISC)2 Guide to the CISSP CBK by : Adam Gordon

As a result of a rigorous, methodical process that (ISC) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC) conducts this process on a regular basis to ensure that the examinations and

Code 44

Code 44
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : 1734200456
ISBN-13 : 9781734200454
Rating : 4/5 (56 Downloads)

Synopsis Code 44 by : S. D. Crockett

In the year 2029, people are allowing neural implants known as chips to be inserted into their foreheads. Marketed as a medical device that will prevent disease and provide health benefits, the chip also tracks everything we see and do. In an Internet of Things world, the chip is celebrated for curing disease and creating unlimited virtual realities. An underground resistance group is working to expose a government plan designed to hack into citizens' brains via the chip and control their thoughts. The group recruits Nick Winston, a young tech executive, to go undercover in the government's newest agency, BrainShare, and find evidence that will expose the truth. Nick slowly descends into a whistleblower's worst nightmare, walking a dangerous tightrope-each action becoming a choice to save his own life or save his society.Code 44 thrusts us into a dystopian future, not too far off, where the merging of man and machine unravels to show how the subtle erosion of a free society creates the ultimate fight between individual privacy and the national good.

Zero Day

Zero Day
Author :
Publisher : Macmillan
Total Pages : 327
Release :
ISBN-10 : 9781429968041
ISBN-13 : 1429968044
Rating : 4/5 (41 Downloads)

Synopsis Zero Day by : Mark Russinovich

An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today---it's a cataclysmic disaster just waiting to happen.

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK
Author :
Publisher : CRC Press
Total Pages : 1008
Release :
ISBN-10 : 9781466554023
ISBN-13 : 1466554029
Rating : 4/5 (23 Downloads)

Synopsis Official (ISC)2 Guide to the CISSP CBK by : Steven Hernandez CISSP

With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation, violating a consumer's privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to da

Trusted Computing Platforms

Trusted Computing Platforms
Author :
Publisher : Springer Science & Business Media
Total Pages : 246
Release :
ISBN-10 : 9780387239170
ISBN-13 : 0387239170
Rating : 4/5 (70 Downloads)

Synopsis Trusted Computing Platforms by : Sean W. Smith

From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security Including real case study experience with security architecture and applications on multiple types of platforms. Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform. Examines more recent cutting-edge experimental work in this area. Written for security architects, application designers, and the general computer scientist interested in the evolution and use of this emerging technology.

Rogue Programs

Rogue Programs
Author :
Publisher : Van Nostrand Reinhold Company
Total Pages : 404
Release :
ISBN-10 : UOM:39015048210564
ISBN-13 :
Rating : 4/5 (64 Downloads)

Synopsis Rogue Programs by : Lance J. Hoffman

Experts in the field of "mischevious" programs are collected here in papers that cover all aspects of viruses--workings, protection, legal and ethical implications--all in nuts-and-bolts language designed to inform both technical and non-technical readers.

Mindprint, the subconscious art code

Mindprint, the subconscious art code
Author :
Publisher : Lulu.com
Total Pages : 274
Release :
ISBN-10 : 9780620596855
ISBN-13 : 0620596856
Rating : 4/5 (55 Downloads)

Synopsis Mindprint, the subconscious art code by : Edmond Furter

Visual archetypes are the DNA of culture. In artefacts and artworks, where archaeo-astronomers see ancient star maps, archaeologists see cultural traditions, and anthropologists see initiation secrets, appear a standard sequence of types, on an axial grid. Structural archaeology uses constellations as myth maps to find the structure of our perception. All inspired artists, in the Stone, Ice, Bronze and Iron Ages; Babylonians, Egyptians, Chinese, Celts, Mayans, Vikings and moderns, subconsciously express mindprint, our eternal artefact. The sixteen clusters of attributes are demonstrated in 200 examples of famous art and rock art works from every continent and culture. Archetypes are statistically proven, and their 'camouflage' is explained in terms of archaeology, anthropology, art history, psychology, philosophy, archaeo-astronomy, esoterica and spirituality. Readers will never look at art, artists or culture as a cumulative, learned or evolved craft again.

NET Security and Cryptography

NET Security and Cryptography
Author :
Publisher : Prentice Hall Professional
Total Pages : 500
Release :
ISBN-10 : 013100851X
ISBN-13 : 9780131008519
Rating : 4/5 (1X Downloads)

Synopsis NET Security and Cryptography by : Peter Thorsteinson

Learn how to make your .NET applications secure! Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. NET Security and Cryptography is a practical and comprehensive guide to implementing both the security and the cryptography features found in the .NET platform. The authors provide numerous clear and focused examples in both C# and Visual Basic .NET, as well as detailed commentary on how the code works. They cover topics in a logical sequence and context, where they are most relevant and most easily understood. All of the sample code is available online at . This book will allow developers to: Develop a solid basis in the theory of cryptography, so they can understand how the security tools in the .NET Framework function Learn to use symmetric algorithms, asymmetric algorithms, and digital signatures Master both traditional encryption programming as well as the new techniques of XML encryption and XML signatures Learn how these tools apply to ASP.NET and Web Services security

Welcome to Eterna

Welcome to Eterna
Author :
Publisher : Trafford Publishing
Total Pages : 1138
Release :
ISBN-10 : 9781553954118
ISBN-13 : 1553954114
Rating : 4/5 (18 Downloads)

Synopsis Welcome to Eterna by : Mark Evanshen

WELCOME TO ETERNA is a captivating story of an intriguing character- Mr. Feyos Rand. He's recently been making contact with a new and strange psychic universe that even he doesn't yet fully understand. Filled with adventure, plot twists, and flashbacks, this book is guaranteed to raise laughs, smiles, and perhaps even cause spontaneous disappearances, thrusting the reader into the exciting world of H-drugs, V-lenses, and Metabugs. So watch out...Eterna is coming and you're next... Please visit the book's website at www.welcometoeterna.com.