You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A practitioners' handbook on securing virtualization, cloud computing, and mobility, this book bridges academic theory with real world implementation. It provides pragmatic guidance on securing the multi-faceted layers of private and public cloud deployments as well as mobility infrastructures. The book offers in-depth coverage of implementation plans, workflows, process consideration points, and project planning. Topics covered include physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, secure mobile architecture and secure mobile coding standards.
The field of computer forensics has experienced significant growth recently and those looking to get into the industry have significant opportunity for upward mobility. Focusing on the concepts investigators need to know to conduct a thorough investigation, Digital Forensics Explained provides an overall description of the forensic practice from a practitioner’s perspective. Starting with an overview, the text describes best practices based on the author’s decades of experience conducting investigations and working in information technology. It illustrates the forensic process, explains what it takes to be an investigator, and highlights emerging trends. Filled with helpful templates and...
Green Communications and Networking introduces novel solutions that can bring about significant reductions in energy consumption in the information and communication technology (ICT) industry-as well as other industries, including electric power. Containing the contributions of leading experts in the field, it examines the latest research advances
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of sensor devices run with one-time batteries. Additi
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer. - Discover the potential of the Smart Grid - Learn in depth about its systems - See its vulnerabilities and how best to protect it
A proliferation of new technologies has lulled many into thinking that we actually have to think less about how we communicate. In fact, communicating and collaborating across time, distance, and cultures has never been more complex or difficult. Written as a series of bulleted tips drawn from client experiences and best practices, Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results presents practical tips to help leaders engage and motivate their geographically dispersed project team members. If you’re a leader of any type of virtual team and want to help your team members collaborate more effectively, then buy this book. You will learn how to: Bui...
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports
Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information. It situates and contextualizes this risk-ba
Next Generation Mobile Broadcasting provides an overview of the past, present, and future of mobile multimedia broadcasting. The first part of the book—Mobile Broadcasting Worldwide—summarizes next-generation mobile broadcasting technologies currently available. This part covers the evolutions of the Japanese mobile broadcasting standard ISDB-T One-Seg, ISDB-Tmm and ISDB-TSB; the evolution of the South Korean T-DMB mobile broadcasting technology AT-DMB; the American mobile broadcasting standard ATSC-M/H; the Chinese broadcasting technologies DTMB and CMMB; second-generation digital terrestrial TV European standard DVB-T2 and its mobile profile T2-Lite; and the multicast/broadcast extensi...