IT eBooks
Download, Read, Use
Web Information Retrieval
Web Information Retrieval

With the proliferation of huge amounts of (heterogeneous) data on the Web, the importance of information retrieval (IR) has grown considerably over the last few years. Big players in the computer industry, such as Google, Microsoft and Yahoo!, are the primary contributors of technology for fast access to Web-based information; and searching capabilities are now integrated into most information systems, ranging from business management software and customer relationship systems to social networks and mobile phone applications. ...
Managing Risk and Information Security, 2nd Edition
Managing Risk and Information Security, 2nd Edition

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It d ...
Foundations of Information Security
Foundations of Information Security

A high-level survey of the information security field by best-selling author Jason Andress. The book covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You'll also learn the basics of topics like: Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process; The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates; The laws and regulations that protect systems and data; Anti-malware tools, firewalls, and intrusion detection systems; Vulnerabilities such as buffe ...
A Graduate Course in Applied Cryptography
A Graduate Course in Applied Cryptography

Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications. While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem. Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through. ...
Building Information Modeling
Building Information Modeling

This book is geared towards users who have no Revit background. It starts with Revit basics such as how to create walls, floors, roof, but it also covers more advanced topics such as creating a complex object, preparing construction documents, and modeling mechanical and structural systems. This book is an open education platform for Architecture and Civil Engineering students to learn Revit and provides students with adequate, coherent, consistent, and cost-saving educational resources. It includes both text and video of each chapter to help students have access to both step-by-step written instructions and videos of each lesson because software instructions are mostly narratives and difficult for students to visualize the procedures and follow the instructions. BIM is one of the most recent developments influencing the architecture, engineering, and construction (AEC) industry. BIM provides the opportunity to improve poor communication and information sharing among building own ...
Model-Driven Development with Executable UML
Model-Driven Development with Executable UML

A comprehensive reference for an executable UML and the advantages of modeling This book presents the most up-to-date technology for rapidly developing information systems using the object-oriented paradigm and models, and establishes an executable profile of UML for such model-driven development. As a software developer, architect, or analyst, you'll benefit from learning how information systems can be developed more efficiently using the object-oriented paradigm and model-driven approach. Written by an expert who is uniquely qualified in the topic, this Wrox reference offers a profile of UML that is formal and executable, instead of the relational paradigm or its incomplete coupling with object orientation. It provides a comprehensive tutorial on model-driven development and UML. ...
Professional Microsoft SQL Server 2008 Programming
Professional Microsoft SQL Server 2008 Programming

Master the increasingly complex feature set of the latest release of Microsoft SQL Server with the information in Professional Microsoft SQL Server 2008 Programming. Review the new features of SQL Server that will be of interest to you as an experienced developer and move on to more detailed, practical code examples. Learn how to write complex queries, build different types of data structures, improve application speed and performance, manage advanced scripting and errors, and design advanced databases the latest edition of this valuable programming guide. ...
Windows 7 Up and Running
Windows 7 Up and Running

This compact book offers the quickest path for Windows XP and Vista users to get started with Microsoft's Windows 7 operating system. With Windows 7: Up and Running, you get the essential information you need to upgrade or install the system and configure it to fit your activities, along with a tour of Windows 7's features and built-in applications. Windows 7 is poised to be a big hit among PC users, and with this handy guide, you can be productive with it right away. ...
Google Analytics
Google Analytics

Take advantage of Google Analytics' powerful and free tools to understand exactly how users behave when they visit your website or use your web application. This hands-on guide shows you how to probe general traffic, marketing, and ecommerce information with these tools, and teaches you how to supplement them with add-ons and external tools when you want to dig even deeper. You'll also learn how to create custom reports to analyze specific issues. ...
Access 2010: The Missing Manual
Access 2010: The Missing Manual

Access may be a complex and intimidating Office application, but you'll tame it quickly with this book. You'll learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry in no time. You'll even delve into the black art of Access programming by learning valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2024