Security MetricsSecurity Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. ...
It's Never Done That Before!When Windows works properly, it's relatively easy to ignore; you can concentrate on the work you're trying to do and forget about the plumbing inside your computer. But when something goes wrong, it often requires an experienced guide to solve the problem and restore the computer to working condition. Everybody who uses Microsoft Windows eventually has to deal with cryptic error messages, frozen screens, and other more or less dramatic problems. Windows troubleshooting is the set of tools and techniques that can identify the source of a problem and find a solution. ...
Hacking VoIPVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.
Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. ...
Game InvadersPresenting a holistic and thoroughly practical investigation of the true nature of computer games that arms readers with a small yet powerful set of theories for developing unique approaches to understanding games. Game Invaders fully integrates genre theory, new media aesthetics, perceptual opportunities, and semiotics into a practical DIY toolkit for games analysis—offering detailed guidance for how to conduct in-depth critiques of game content and gameplay.
Featuring an informal and witty writing style, the book devotes a number of chapters to specific games from all eras, clearly demonstrating the practical application of the theories to modern, large-scale computer games. ...
Loop-shaping Robust ControlThe loop-shaping approach consists of obtaining a specification in relation to the open loop of the control from specifications regarding various closed loop transfers, because it is easier to work on a single transfer (in addition to the open loop) than on a multitude of transfers (various loopings such as set point/error, disturbance / error, disturbance / control, etc.). The simplicity and flexibility of the approach make it very well adapted to the industrial context.
This book presents the loop-shaping approach in its entirety, starting with the declension of high-level specifications into a loop-shaping specification. It then shows how it is possible to fully integrate this approach for the calculation of robust and efficient correctors with the help of existing techniques, which have already been industrially tried and tested, such as H-infinity synthesis. ...
Teach Yourself Visually PowerPoint 2013PowerPoint 2013 boasts updated features and new possibilities; this highly visual tutorial provides step-by-step instructions to help you learn all the capabilities of PowerPoint 2013. It covers the basics, as well as all the exciting new changes and additions in a series of easy-to-follow, full-color, two-page tutorials. Learn how to create slides, dress them up using templates and graphics, add sound and animation, and more. This book is the ideal "show me, don't tell me" guide to PowerPoint 2013. ...
Windows 8 TweaksFrom a Microsoft MVP, who is also the savvy creator of Tweaks.com, comes this ultimate collection of Windows 8 workarounds. Steve Sinchak takes you way beyond default system settings, deep under the hood of Windows 8, down to the hidden gems that let you customize your Windows 8 system like you wouldn't believe. From helping you customize the appearance to setting up home networking, sharing media, and squeezing every ounce of performance out of the OS, this book delivers. Get ready to rock and roll with Windows 8! ...
Mastering Unix Shell Scripting, 2nd EditionUNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting solution. Covering Bash, Bourne, and Korn shell scripting, this updated edition provides complete shell scripts plus detailed descriptions of each part. UNIX programmers and system administrators can tailor these to build tools that monitor for specific system events and situations, building solid UNIX shell scripting skills to solve real-world system administration problems. ...
Computer Assisted Exercises and TrainingReaders can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large civilian organizations that are looking to teach and test their strategies and procedures without the added cost of manpower.
Computer Assisted Exercises and Training: A Reference Guide is indispensable reading for research engineers, computer scientists, software engineers working with modeling and simulation, homeland security specialists, staff in simulation training centers, military strategists and commanders, and many others. It also serves as a valuable textbook for modeling and simulation courses at the upper-undergraduate and graduate levels. ...
Constraint NetworksA major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research and work in this area, divided into four main topics: representation, inference, search, and learning. The results obtained and reproduced in this book have a wide applicability, regardless of the nature of the problem or the constraints involved, making it an extremely user-friendly resource for those involved in this field. ...