You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk...
Questions of how the design of cities can respond to the challenge of climate change dominate the thoughts of urban planners and designers across the U.S. and Canada. With admirable clarity, Patrick Condon responds to these questions. He addresses transportation, housing equity, job distribution, economic development, and ecological systems issues and synthesizes his knowledge and research into a simple-to-understand set of urban design recommendations. No other book so clearly connects the form of our cities to their ecological, economic, and social consequences. No other book takes on this breadth of complex and contentious issues and distills them down to such convincing and practical solutions.
The county diagnostic method is a spatially explicit, unit specific, component expanded regional environmental footprint framework for the USA designed by Bryce Lawrence to compare the influence of ecoregions on poly‐factorial environmental footprints. This 'diagnostic assessment' quantifies and compares the flows of food, water, energy, carbon, municipal solid waste, wastewater and spatial extent of ecosystem conservation. The county diagnostic fills the gap in regional environmental planning in the USA by bridging urban and state level planning.
If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps Learn how attackers infect apps with malware through code injection Discover how attackers defeat iOS keychain and data-protection encryption Use a debugger and custom code injection to manipulate the runtime Objective-C environment Prevent attackers from hijacking SSL sessions and stealing traffic Securely delete files and design your apps to prevent forensic data leakage Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowled...
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the se...
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hacker...
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, application...
2007 CHOICE Outstanding Academic Title Sociologists have too often discounted the role of space in inequality. This book showcases a recent generation of inquiry that attends to poverty, prosperity, and power across a range of territories and their populations within the United States, addressing spatial inequality as a thematically distinct body of work that spans sociological research traditions. The contributors' various perspectives offer an agenda for future action to bridge sociology's diverse and often narrowly focused spatial and inequality traditions.
This compendium of 29 chapters from 18 countries contains both fundamental and advanced insight into the inevitable shift from cities dominated by the fossil-fuel systems of the industrial age to a renewable-energy based urban development framework. The cross-disciplinary handbook covers a range of diverse yet relevant topics, including: carbon emissions policy and practice; the role of embodied energy; urban thermal performance planning; building efficiency services; energy poverty alleviation efforts; renewable community support networks; aspects of household level bio-fuel markets; urban renewable energy legislation, programs and incentives; innovations in individual transport systems; global urban mobility trends; implications of intelligent energy networks and distributed energy supply and storage; and the case for new regional monetary systems and lifestyles. Presented are practical and principled aspects of technology, economics, design, culture and society, presenting perspectives that are both local and international in scope and relevance.