Skip to main content

Books in Physical sciences and engineering

  • Mobile Data Loss

    Threats and Countermeasures
    • 1st Edition
    • Michael T. Raggo
    • English
    The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
  • Essential Skills for Hackers

    • 1st Edition
    • Kevin Cardwell + 1 more
    • English
    Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
  • Meeting People via WiFi and Bluetooth

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
  • Cyber Security Awareness for Accountants and CPAs

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
  • Fuel Flexible Energy Generation

    Solid, Liquid and Gaseous Fuels
    • 1st Edition
    • John Oakey
    • English
    Fuel Flexible Energy Generation: Solid, Liquid and Gaseous Fuels provides updated information on flexible fuel energy generation, the process by which one or more fuels can be combusted in the same boiler or turbine to generate power. By adapting or building boilers and turbines to accept multiple fuel sources, they can be co-fired with biomass and waste derived fuels, allowing a reduction in carbon output, thus providing cleaner energy. Fuel flexibility is becoming more important in a world of diminishing fossil fuel stocks. Many countries are investing in the development of more efficient fuel flexible boilers and turbines, and their use is becoming more prevalent in industry as well. This book provides comprehensive coverage of flexible fuel energy generation across all potential fuel types, and was written by a selection of experts in the field who discuss the types of fuels which can be used in fuel flexible energy generation, from solid fuels to biomass fuels, the preparation of fuels to be used in fuel flexible operations, that includes their handling and transport, and combustion and conversion technologies with chapters ranging from large-scale coal gasification to technology options and plant design issues.
  • Data Mapping for Data Warehouse Design

    • 1st Edition
    • Qamar Shahbaz
    • English
    Data mapping in a data warehouse is the process of creating a link between two distinct data models’ (source and target) tables/attributes. Data mapping is required at many stages of DW life-cycle to help save processor overhead; every stage has its own unique requirements and challenges. Therefore, many data warehouse professionals want to learn data mapping in order to move from an ETL (extract, transform, and load data between databases) developer to a data modeler role. Data Mapping for Data Warehouse Design provides basic and advanced knowledge about business intelligence and data warehouse concepts including real life scenarios that apply the standard techniques to projects across various domains. After reading this book, readers will understand the importance of data mapping across the data warehouse life cycle.
  • Multiscreen UX Design

    Developing for a Multitude of Devices
    • 1st Edition
    • Wolfram Nagel
    • English
    People today use technology on different devices in different locations. Users expect to access information on all relevant screens and across multiple channels through smartphones, tablets, laptops/desktops, smart (internet-connected) TVs, and other devices, such as smartwatches for example. Multiscreen is no longer a nice add-on, it’s a requirement. In this environment, user experience needs to cater to multiple devices. This book provides a holistic approach that will help UX professionals to offer a hands-on guide for UX design across multiple screens. It presents an opportunity to learn how to cater designs for customers. Readers will find patterns, strategies, examples and case studies, methodologies, and insights to help inspire them to develop a viable strategy for their own digital products and services. UX professionals will walk through important elements of multiscreen UX: Investigating the devices and their capabilities Understanding the users and their capabilities Considering the context in which users use these devices Navigating next generation information experiences and the future of content management Designing content and UI architecture for multiscreen projects
  • Plastics Packaging

    Properties, Processing, Applications, and Regulations
    • 3rd Edition
    • Susan E.M. Selke + 2 more
    • English
    The increasing importance of plastic materials in packaging makes it mandatory for everyone in this industry to command a basic understanding of the properties of the common packaging plastics. The third edition of this well received book provides just that to students and packaging professionals alike: Material properties and how they relate to the chemical structure of the polymers, common processing methods for packaging applications, help with writing specifications, designing, fabricating, testing, and controlling the quality of the plastic material are covered comprehensively.
  • Introduction to Protein Mass Spectrometry

    • 1st Edition
    • Pradip K. Ghosh
    • English
    Introduction to Protein Mass Spectrometry provides a comprehensive overview of this increasingly important, yet complex, analytical technique. Unlike many other methods which automatically yield an absolutely unique protein name as output, protein mass spectrometry generally requires a deduction of protein identity from determination of peptide fragmentation products. This book enables readers to both understand, and appreciate, how determinations about protein identity from mass spectrometric data are made. Coverage begins with the technical basics, including preparations, instruments, and spectrometric analysis of peptides and proteins, before exploring applied use in biological applications, bioinformatics, database, and software resources. Citing the most recent and relevant work in the field of biological mass spectrometry, the book is written for researchers and scientists new to the field, but is also an ideal resource for those hoping to hone their analytical abilities.
  • Security Controls Evaluation, Testing, and Assessment Handbook

    • 1st Edition
    • Leighton Johnson
    • English
    Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.