Hacking Point of SaleAs recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale. ...
Practical Reverse EngineeringReverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. ...
The Browser Hacker's HandbookThe Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.
The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. ...
Adobe Acrobat X PDF BibleConsistently the most authoritative and comprehensive resource on the Acrobat PDF format, this standard reference returns with in-depth coverage of the newest version of Acrobat. Written by bestselling author Ted Padova, this book is packed with real-world insights and techniques gained from Padova's daily use of Acrobat under deadline constraints. You'll discover everything there is to know about using Acrobat X for print prepress, the Internet, CD-ROMs, and other forms of media. ...
Cloud Computing BibleIts potential for lowering IT costs makes cloud computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Web Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you ll be using or implementing cloud computing.
Anyone involved with planning, implementing, using, or maintaining a cloud computing project will rely on the information in Cloud Computing Bible. ...
Creating Business AgilityCreating Business Agility provides a game plan for integrating technology to build a smarter, more customer-centric business. Using a series of case studies as examples throughout, the book describes the agility that comes from collaborative commerce, and provides key decision makers the implementation roadmap they need to build a successful business ecosystem. The focus is on Business Agility Readiness in terms of the five major changes affecting the information technology landscape, and how data-driven delivery platforms and decision-making processes are being reinvented using digital relationships with a social business model as the consumer world of technology drives innovation and collaboration. ...
Making Sense of Data I, 2nd EditionA proven go-to guide for data analysis, Making Sense of Data I: A Practical Guide to Exploratory Data Analysis and Data Mining, Second Edition focuses on basic data analysis approaches that are necessary to make timely and accurate decisions in a diverse range of projects. Based on the authors' practical experience in implementing data analysis and data mining, the new edition provides clear explanations that guide readers from almost every field of study.
In order to facilitate the needed steps when handling a data analysis or data mining project, a step-by-step approach aids professionals in carefully analyzing data and implementing results, leading to the development of smarter business decisions. ...
A Practical Guide to Data Mining for Business and IndustryData mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create a versatile reference book, allowing readers to look for specific methods as well as for specific applications. The book is formatted to allow statisticians, computer scientists, and economists to cross-reference from a particular application or method to sectors of interest. ...
Learn SQL Server Administration in a Month of LunchesMicrosoft SQL Server is used by millions of businesses, ranging in size from Fortune 500s to small shops worldwide. Whether you're just getting started as a DBA, supporting a SQL Server-driven application, or you've been drafted by your office as the SQL Server admin, you do not need a thousand-page book to get up and running.
Learn SQL Server Administration in a Month of Lunches is the perfect way to get started with SQL Server. This concise, easy-to-read book skips academic introductions and teaches you day-to-day techniques for maintenance, backup and recovery, performance monitoring, and more. Each of the 21 short lessons gives you practical takeaways you'll use over and over. ...
EJB 3 in Action, 2nd EditionThe EJB 3 framework provides a standard way to capture business logic in manageable server-side modules, making it easier to write, maintain, and extend Java EE applications. EJB 3.2 provides more enhancements and intelligent defaults and integrates more fully with other Java technologies, such as CDI, to make development even easier.
EJB 3 in Action, Second Edition is a fast-paced tutorial for Java EE business component developers using EJB 3.2, JPA, and CDI. It tackles EJB head-on through numerous code samples, real-life scenarios, and illustrations. Beyond the basics, this book includes internal implementation details, best practices, design patterns, performance tuning tips, and various means of access including Web Services, REST Services, and WebSockets. ...