-
Passwords & Internet Addresses Journal For Dummies
Author Ryan C. Williams
Keep track of your passwords and learn how to make them betterYou have dozens of passwords for dozens of uses, and it seems every account has different password requirements. How can you keep them all straight while keeping them secure? This ingenious little book so....
Release Date 2013/11 -
Sourcing to Support the Green Initiative
Author Lisa Ellram , Wendy Tate
The “green” or environmental sustainability movement has taken hold throughout the world. Its staying power is confirmed by that fact that environmental emphasis in organizations did not decrease during the recent global recession, but rather increased. However, sin....
Release Date 2013/07 -
Optical Coding Theory with Prime
Author Guu-Chang Yang , Wing C. Kwong
Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory—until now. Written by renowned authorities in the field, O....
Release Date 2013/05 -
Information Theory, Coding and Cryptography
Author Mandal , Nilotpal Manna , Arijit Saha
Information Theory, Coding & Cryptography has been designed as a comprehensive text for the students of engineering discussing Source Encoding, Error Control Codes & Cryptography. The book contains the recent developments of coded modulation, trellises for ....
Release Date 2013/05 -
Secure Coding in C and C++, Second Edition
Author Robert C. Seacord
Learn the Root Causes of Software Vulnerabilities and How to Avoid ThemCommonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a rel....
Release Date 2013/04 -
Author Robert G. Werner , James A. Bach
The H-1B visa is the gateway for the world's best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. How to Secure Your H-1B Visa guides employees and employers alike through....
Release Date 2013/01 -
Author Eric J Gruber
Like to build websites in the wild with your MacBook? This concise hands-on guide introduces you to the ideal editor: Coda 2. Rather than clutter your screen with shell access, a separate CSS editor, and a version control app, you’ll discover how Coda’s "one-window ....
Release Date 2013/01 -
Coding Interviews: Questions, Analysis & Solutions
Author Harry He
This book is about coding interview question of software and Internet companies. It covers five key factors which determine performance of candidates: (1) the basics of programming languages, data structures and algorithms, (2) approaches to writing code with high q....
Release Date 2012/12 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
The CERT® Oracle® Secure Coding Standard for Java™
Author David Svoboda , Dean F. Sutherland , Robert C. Seacord , Dhruv Mohindra , Fred Long
“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A....
Release Date 2011/09 -
Error Control Coding For B3G/4G Wireless Systems: Paving the Way to IMT-Advanced Standards
Author Dr. Moshe Ran , Dr. Thierry Lestable
Covering the fast evolving area of advanced coding, Error Control Coding for B3G/4G Wireless Systems targets IMT-Advanced systems to present the latest findings and implementation solutions. The book begins by detailing the fundamentals of advanced coding techniques....
Release Date 2011/06 -
Tools for Signal Compression: Applications to Speech and Audio Coding
Author Nicolas Moreau
This book presents tools and algorithms required to compress/uncompress signals such as speech and music. These algorithms are largely used in mobile phones, DVD players, HDTV sets, etc.In a first rather theoretical part, this book presents the standard tools used i....
Release Date 2011/05 -
Visual Media Coding and Transmission
Author Ahmet Kondoz
This book presents the state-of-the-art in visual media coding and transmissionVisual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields ....
Release Date 2010/04 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
Author Robert C. Seacord
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specif....
Release Date 2005/09 -
Author Peter Senge , Don Frick
Meet the man whose work influenced some of the world's most prominent business leaders and spawned a worldwide movement that is still gaining strength today. Robert Greenleaf's landmark 1970 essay, The Servant as Leader, introduced the now common term “servan....
Release Date 2004/06 -
Secure Programming Cookbook for C and C++
Author Matt Messier , John Viega
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly,....
Release Date 2003/07 -
Secure Coding: Principles and Practices
Author Kenneth R. van Wyk , Mark G. Graff
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and ....
Release Date 2003/06 -
Building Secure Software: How to Avoid Security Problems the Right Way
Author Gary McGraw , John Viega
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all....
Release Date 2001/09