7 results (0,13708 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Android Security Attacks and Defenses

Android Security Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture the book describes Android permissions including Manifest permissions to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system including import directories and files so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www. androidinsecurity. com. It explains how to crack SecureApp. apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics mobile device pen-testing methodology malware analysis secure coding and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book’s site includes a resource section where readers can access downloads for applications tools created by users and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text wherever needed. Visit www. androidinsecurity. com for more information. | Android Security Attacks and Defenses

GBP 56.99
1

Information Technology Control and Audit Fifth Edition

Knowledge Management in Practice

Knowledge Management in Practice

This evidence-based book provides the framework and guidelines that professionals need for working with the contemporary explosion of data that is creating opportunities and challenges to all phases of our society and commerce. –Larry R. Medsker Research Professor in Physics and Data Science The George Washington UniversityKnowledge Management in Practice is a resource on how knowledge management (KM) is implemented. It provides specific KM methods tips techniques and best practices to gain competitive advantage and the most from investing in KM. It examines how KM is leveraged by first responders the military healthcare providers insurance and financial services companies legal firms human resources departments merger and acquisition (M&A) firms and research institutions. Essential KM concepts are explored not only from a foundational perspective but also from a practical application. These concepts include capturing and codifying tacit and explicit knowledge KM methods information architecture search KM and social media KM and Big Data and the adoption of KM. Readers can visit the book’s companion website KM Mentor (www. KMMentor. com) where they can access:Presentations by industry leaders on a variety of topicsKM templates and instruction on executing KM strategy performing knowledge transfer and KM assessments and auditsKM program and project implementation guidanceInsights and reviews on KM toolsGuidance on implementing and executing various KM MethodsSpecialized KM publicationsA private secure collaboration community for members to discuss ideas and get expert answers and advice

GBP 44.99
1

Database Modeling Step by Step

Database Modeling Step by Step

With the aim of simplifying relational database modeling Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach which is a more simplistic intuitive way to building relational database models. Going from basics to contemporary topics the book opens with relational data modeling and ends with BigData database modeling following a road map of the evolution in relational modeling and including brief introductions to data warehousing and BigData modeling. A break-down of the elements of a model explains what makes up a relational data model. This is followed by a comparison between standard normalization and a more simplistic intuitive approach to data modeling that a beginner can follow and understand. A brief chapter explains how to use the database programming language SQL (Structured Query Language) which reads from and writes to a relational database. SQL is fundamental to data modeling because it helps in understanding how the model is used. In addition to the relational model the last three chapters cover important modern world topics including denormalization that leads into data warehouses and BigData database modeling. The book explains how there is not much to logical data modeling in BigData databases because as they are often schema-less which means that BigData databases do not have schemas embedded into the database itself they have no metadata and thus not much of a logical data model. Online bonus chapters include a case study that covers relational data modeling and are available at the author’s web site: www. oracletroubleshooter. com/datamodeling. html | Database Modeling Step by Step

GBP 54.99
1

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

The DataOps Revolution Delivering the Data-Driven Enterprise

The DataOps Revolution Delivering the Data-Driven Enterprise

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author’s own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www. kinaesis. com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members. | The DataOps Revolution Delivering the Data-Driven Enterprise

GBP 31.99
1

Core Software Security Security at the Source

Core Software Security Security at the Source

. an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. . Readers are armed with firm solutions for the fight against cyber threats. —Dr. Dena Haritos Tsamitis. Carnegie Mellon University. a must read for security specialists software developers and software engineers. . should be part of every security professional’s library. —Dr. Larry Ponemon Ponemon Institute. the definitive how-to guide for software security professionals. Dr. Ransome Anmol Misra and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. . A must-have for anyone on the front lines of the Cyber War . —Cedric Leighton Colonel USAF (Ret. ) Cedric Leighton AssociatesDr. Ransome Anmol Misra and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! —Eric S. Yuan Zoom Video CommunicationsThere is much publicity regarding network security but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards in which we conduct our digital lives. In response security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative innovative people who write software. Core Software Security expounds developer-centric software security a holistic process to engage creativity for security. As long as software is developed by humans it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development which lies at the heart of our cyber infrastructure. Whatever development method is employed software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people process and technology Highlights the key success factors deliverables and metrics for each phase of the SDL Examines cost efficiencies optimized performance and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www. androidinsecurity. com/ | Core Software Security Security at the Source

GBP 44.99
1