Computer science Books

2289 products


  • HandsOn Large Language Models

    O'Reilly Media HandsOn Large Language Models

    15 in stock

    Book Synopsis

    15 in stock

    £47.99

  • CompTIA Network Certification AllinOne Exam Guide

    McGraw-Hill Education CompTIA Network Certification AllinOne Exam Guide

    Out of stock

    Book SynopsisThis up-to-date Mike Meyers exam guide delivers complete coverage of every topic on the N10-008 version of the CompTIA Network+ Certification examGet complete coverage of all the CompTIA Network+ exam objectives inside this comprehensive resource. Created and edited by Mike Meyers, the leading expert on CompTIA certification and training, CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition covers exam N10-008 in full detail. Youâll find learning objectives at the beginning of each chapter, exam tips, scenarios, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative guide also serves as an essential on-the-job reference.Covers all exam topics, including: Network architectures Cabling and topology Ethernet basics Network installation TCP/IP applications and network protocols Routing Network naming Advanced networkTable of ContentsAcknowledgmentsIntroduction Chapter 1. Network ModelsChapter 2. Cabling and TopologyChapter 3. Ethernet BasicsChapter 4. Ethernet StandardsChapter 5. Installing a Physical NetworkChapter 6. TCP/IP BasicsChapter 7. RoutingChapter 8. TCP/IP ApplicationsChapter 9. Network NamingChapter 10. Securing TCP/IPChapter 11. Switch FeaturesChapter 12. IPv6Chapter 13. WAN ConnectivityChapter 14. Wireless NetworkingChapter 15. Virtualization and Cloud ComputingChapter 16. Data CentersChapter 17. Integrating Network DevicesChapter 18. Network OperationsChapter 19. Protecting Your NetworkChapter 20. Network Monitoring Appendix A. Exam Objective MapAppendix B. Create Your Study PlanAppendix C. About the Online Content Glossary Index

    Out of stock

    £43.69

  • CISSP AllinOne Exam Guide Ninth Edition

    McGraw-Hill Education CISSP AllinOne Exam Guide Ninth Edition

    15 in stock

    Book SynopsisA new edition of Shon Harrisâ bestselling exam prep guideâfully updated for the 2021 version of the CISSP examThoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all objectives in the 2021 CISSP exam developed by the International Information Systems Security Certification Consortium (ISC)2 . CISSP All-in-One Exam Guide, Ninth Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Written by leading experts in information security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.Covers all 8 CISSP domains: Security and risk management Asset security Security architecture and engineering Communication and network security Identity and access ma

    15 in stock

    £40.49

  • Innovators

    Simon & Schuster Ltd Innovators

    1 in stock

    Book SynopsisFollowing his blockbuster biography of Steve Jobs, The Innovatorsis Walter Isaacson''s story of the people who created the computer and the Internet. It is destined to be the standard history of the digital revolution and a guide to how innovation really works. What talents allowed certain inventors and entrepreneurs to turn their disruptive ideas into realities? What led to their creative leaps? Why did some succeed and others fail? In his exciting saga, Isaacson begins with Ada Lovelace, Lord Byron''s daughter, who pioneered computer programming in the 1840s. He then explores the fascinating personalities that created our current digital revolution, such as Vannevar Bush, Alan Turing, John von Neumann, J.C.R. Licklider, Doug Engelbart, Robert Noyce, Bill Gates, Steve Wozniak, Steve Jobs, Tim Berners-Lee and Larry Page. This is the story of how their minds worked and what made them so creative. It''s also a narrative of how their ability to collaborate and m

    1 in stock

    £9.89

  • CTS Certified Technology Specialist Exam Guide

    McGraw-Hill Education CTS Certified Technology Specialist Exam Guide

    15 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The Most Complete, Up-to-Date CTS Exam Study SystemPublished with AVIXAâ, CTS Certified Technical Specialist Exam Guide, Third Edition provides comprehensive coverage of all objectives on the latest release of the AVIXA Certified Technology Specialist examâthe leading internationally recognized audiovisual (AV) certification. Youâll get learning objectives at the beginning of each chapter, best practices, checklists, diagrams, photos, chapter review questions with in-depth explanations, and a full-color insert. Designed to help you prepare for the CTS exam, this authoritative resource also serves as an essential on-the-job reference.Digital content includes:â  New sample CTS questions from AVIXACovers all current CTTable of ContentsPART 1: The Certified Technology Specialist and the CTS ExamChapter 1: What Is a Certified Technology Specialist?Chapter 2: The CTS ExamPART 2: Essentials of AV TechnologyChapter 3: Analog and Digital SignalsChapter 4: Audio SystemsChapter 5: Video SystemsChapter 6: NetworksChapter 7: Signal-Management SystemsChapter 8: Control SystemsChapter 9: Electrical SystemsChapter 10: Wireless Radio SystemsPART 3: Creating AV SolutionsChapter 11: Gathering Customer InformationChapter 12: Conducting an Initial Site SurveyChapter 13: Evaluating a Site EnvironmentChapter 14: Recommending Changes to the Site EnvironmentChapter 15: Developing an AV Project ScopeChapter 16: Designing AV SolutionsPART 4: Implementing AV SolutionChapter 17: Integrating AV SolutionsChapter 18: Operating AV SolutionsChapter 19: Managing an AV ProjectPART 5: Servicing AV SolutionsChapter 20: Maintaining AV OperationsChapter 21: Conducting Maintenance ActivitiesChapter 22: Troubleshooting and Repairing AV SolutionsPART 6: AppendicesAppendix A: Future Trends in Professional AVAppendix B: AVIXA StandardsAppendix C: AV MathGlossary

    15 in stock

    £40.49

  • Silberschatzs Operating System Concepts Global

    John Wiley & Sons Inc Silberschatzs Operating System Concepts Global

    15 in stock

    Book SynopsisTable of ContentsPart One Overview Chapter 1 Introduction 1.1 What Operating Systems Do 4 1.2 Computer-System Organization 7 1.3 Computer-System Architecture 15 1.4 Operating-System Operations 21 1.5 Resource Management 27 1.6 Security and Protection 33 1.7 Virtualization 34 1.8 Distributed Systems 35 1.9 Kernel Data Structures 36 1.10 Computing Environments 40 1.11 Free and Open-Source Operating Systems 46 1.12 Summary 51 Exercises 53 Further Reading 57 Chapter 2 Operating-System Structures 2.1 Operating-System Services 59 2.2 User and Operating-System Interface 62 2.3 System Calls 66 2.4 System Services 78 2.5 Linkers and Loaders 79 2.6 Why Applications Are Operating-System Specific 81 2.7 Operating-System Design and Implementation 83 2.8 Operating-System Structure 85 2.9 Building and Booting an Operating System 95 2.10 Operating-System Debugging 99 2.11 Summary 104 Exercises 105 Further Reading 107 Part Two Process Management Chapter 3 Processes 3.1 Process Concept 112 3.2 Process Scheduling 116 3.3 Operations on Processes 122 3.4 Interprocess Communication 129 3.5 IPC in Shared-Memory Systems 131 3.6 IPC in Message-Passing Systems 133 3.7 Examples of IPC Systems 138 3.8 Communication in Client–Server Systems 151 3.9 Summary 159 Exercises 161 Further Reading 166 Chapter 4 Threads & Concurrency 4.1 Overview 168 4.2 Multicore Programming 170 4.3 Multithreading Models 174 4.4 Thread Libraries 176 4.5 Implicit Threading 184 4.6 Threading Issues 196 4.7 Operating-System Examples 202 4.8 Summary 204 Exercises 205 Further Reading 208 Chapter 5 CPU Scheduling 5.1 Basic Concepts 212 5.2 Scheduling Criteria 216 5.3 Scheduling Algorithms 217 5.4 Thread Scheduling 229 5.5 Multi-Processor Scheduling 232 5.6 Real-Time CPU Scheduling 239 5.7 Operating-System Examples 246 5.8 Algorithm Evaluation 256 5.9 Summary 262 Exercises 263 Further Reading 270 Part Three Process Synchronization Chapter 6 Synchronization Tools 6.1 Background 273 6.2 The Critical-Section Problem 276 6.3 Peterson’s Solution 278 6.4 Hardware Support for Synchronization 281 6.5 Mutex Locks 286 6.6 Semaphores 288 6.7 Monitors 292 6.8 Liveness 299 6.9 Evaluation 300 6.10 Summary 302 Exercises 303 Further Reading 309 Chapter 7 Synchronization Examples 7.1 Classic Problems of Synchronization 311 7.2 Synchronization within the Kernel 317 7.3 POSIX Synchronization 321 7.4 Synchronization in Java 325 7.5 Alternative Approaches 333 7.6 Summary 336 Exercises 336 Further Reading 338 Chapter 8 Deadlocks 8.1 System Model 342 8.2 Deadlock in Multithreaded Applications 343 8.3 Deadlock Characterization 345 8.4 Methods for Handling Deadlocks 350 8.5 Deadlock Prevention 351 8.6 Deadlock Avoidance 354 8.7 Deadlock Detection 361 8.8 Recovery from Deadlock 365 8.9 Summary 367 Exercises 368 Further Reading 374 Part Four Memory Management Chapter 9 Main Memory 9.1 Background 379 9.2 Contiguous Memory Allocation 386 9.3 Paging 390 9.4 Structure of the Page Table 401 9.5 Swapping 406 9.6 Example: Intel 32- and 64-bit Architectures 409 9.7 Example: ARMv8 Architecture 413 9.8 Summary 414 Exercises 415 Further Reading 420 Chapter 10 Virtual Memory 10.1 Background 421 10.2 Demand Paging 424 10.3 Copy-on-Write 431 10.4 Page Replacement 433 10.5 Allocation of Frames 445 10.6 Thrashing 451 10.7 Memory Compression 457 10.8 Allocating Kernel Memory 458 10.9 Other Considerations 462 10.10 Operating-System Examples 468 10.11 Summary 472 Exercises 473 Further Reading 482 Part Five Storage Management Chapter 11 Mass-Storage Structure 11.1 Overview of Mass-Storage Structure 485 11.2 HDD Scheduling 493 11.3 NVM Scheduling 497 11.4 Error Detection and Correction 498 11.5 Storage Device Management 499 11.6 Swap-Space Management 503 11.7 Storage Attachment 505 11.8 RAID Structure 509 11.9 Summary 521 Exercises 522 Further Reading 527 Chapter 12 I/O Systems 12.1 Overview 529 12.2 I/O Hardware 530 12.3 Application I/O Interface 540 12.4 Kernel I/O Subsystem 548 12.5 Transforming I/O Requests to Hardware Operations 556 12.6 STREAMS 559 12.7 Performance 561 12.8 Summary 564 Exercises 565 Further Reading 567 Part Six File System Chapter 13 File-System Interface 13.1 File Concept 571 13.2 Access Methods 581 13.3 Directory Structure 583 13.4 Protection 592 13.5 Memory-Mapped Files 597 13.6 Summary 602 Exercises 602 Further Reading 606 Chapter 14 File-System Implementation 14.1 File-System Structure 608 14.2 File-System Operations 610 14.3 Directory Implementation 612 14.4 Allocation Methods 614 14.5 Free-Space Management 622 14.6 Efficiency and Performance 626 14.7 Recovery 630 14.8 Example: The WAFL File System 633 14.9 Summary 637 Exercises 638 Further Reading 640 Chapter 15 File-System Internals 15.1 File Systems 643 15.2 File-System Mounting 644 15.3 Partitions and Mounting 647 15.4 File Sharing 648 15.5 Virtual File Systems 649 15.6 Remote File Systems 651 15.7 Consistency Semantics 654 15.8 NFS 656 15.9 Summary 661 Exercises 662 Further Reading 664 Part Seven Security and Protection Chapter 16 Security 16.1 The Security Problem 669 16.2 Program Threats 673 16.3 System and Network Threats 682 16.4 Cryptography as a Security Tool 685 16.5 User Authentication 696 16.6 Implementing Security Defenses 701 16.7 An Example: Windows 10 710 16.8 Summary 712 Exercises 713 Further Reading 714 Chapter 17 Protection 17.1 Goals of Protection 717 17.2 Principles of Protection 718 17.3 Protection Rings 719 17.4 Domain of Protection 721 17.5 Access Matrix 725 17.6 Implementation of the Access Matrix 729 17.7 Revocation of Access Rights 732 17.8 Role-Based Access Control 733 17.9 Mandatory Access Control (MAC) 734 17.10 Capability-Based Systems 735 17.11 Other Protection Improvement Methods 737 17.12 Language-Based Protection 740 17.13 Summary 746 Exercises 747 Further Reading 749 Part Eight Advanced Topics Chapter 18 Virtual Machines 18.1 Overview 753 18.2 History 755 18.3 Benefits and Features 756 18.4 Building Blocks 759 18.5 Types of VMs and Their Implementations 765 18.6 Virtualization and Operating-System Components 771 18.7 Examples 778 18.8 Virtualization Research 780 18.9 Summary 781 Exercises 782 Further Reading 783 Chapter 19 Networks and Distributed Systems 19.1 Advantages of Distributed Systems 785 19.2 Network Structure 787 19.3 Communication Structure 790 19.4 Network and Distributed Operating Systems 801 19.5 Design Issues in Distributed Systems 805 19.6 Distributed File Systems 809 19.7 DFS Naming and Transparency 813 19.8 Remote File Access 816 19.9 Final Thoughts on Distributed File Systems 819 19.10 Summary 820 Exercises 821 Further Reading 825 Credits 827 Index 829

    15 in stock

    £45.59

  • Fundamentals of Python First Programs

    Fundamentals of Python First Programs

    15 in stock

    Book SynopsisTable of Contents1. Introduction. 2. Data Types and Expressions. 3. Control Statements. 4. Strings and Text Files. 5. Lists and Dictionaries. 6. Design with Functions. 7. Design with Recursion. 8. Simple Graphics and Image Processing. 9. Graphical User Interfaces. 10. Design with Classes. 11. Data Analysis and Visualization. 12. Network Applications and Client/Server Programming. 13. Searching, Sorting, and Complexity. Appendices. Glossary. Index.

    15 in stock

    £66.49

  • Mike Meyers CompTIA A Guide to Managing and

    McGraw-Hill Education Mike Meyers CompTIA A Guide to Managing and

    15 in stock

    Book SynopsisFully Updated, Essential Skills for a Successful IT CareerCreated and edited by the leading authority on CompTIA A+ certification and training, this four-color guide will help you pass CompTIA A+ exams 220-1101 and 220-1102 and become a certified IT professional with proven expertise in hardware and software. Mike Meyersâ CompTIA A+â Guide to Managing and Troubleshooting PCs, Seventh Edition offers complete coverage of the latest exam objectives. Youâll get on-the-job tips, end-of-chapter review questions, and hundreds of photographs and illustrations.Learn how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Establish users and groups Set up video and multimedia cards Table of ContentsCH 1 Safety and ProfessionalismCH 2 The Visible ComputerCH 3 CPUsCH 4 RAMCH 5 FirmwareCH 6 MotherboardsCH 7 Power SuppliesCH 8 Mass Storage TechnologiesCH 9 Implementing Mass StorageCH 10 Essential PeripheralsCH 11 Installing and Upgrading Operating SystemsCH 12 Operating System OperationsCH 13 Users, Groups, and PermissionsCH 14 Maintaining and Optimizing Operating SystemsCH 15 Command Line InterfaceCH 16 Troubleshooting Operating SystemsCH 17 Display TechnologiesCH 18 Networking EssentialsCH 19 Local Area NetworkingCH 20 Wireless NetworkingCH 21 The InternetCH 22 VirtualizationCH 23 Portable ComputingCH 24 Mobile DevicesCH 25 Securing Mobile DevicesCH 26 Printers and Multifunction DevicesCH 27 Securing ComputersCH 28 Operational ProceduresApp A Mapping to the CompTIA A+ ObjectivesApp B About the Online ContentGL Glossary

    15 in stock

    £47.24

  • Storytelling with Data

    John Wiley & Sons Inc Storytelling with Data

    15 in stock

    Book SynopsisTable of ContentsAcknowledgments vii About the author ix Introduction xi Chapter 1 Understand the context 1 Chapter 2 Choose an effective visual 51 Chapter 3 Identify & eliminate clutter 107 Chapter 4 Focus attention 147 Chapter 5 Think like a designer 191 Chapter 6 Tell a story 235 Chapter 7 Practice more with Cole 285 Chapter 8 Practice more on your own 355 Chapter 9 Practice more at work 375 Chapter 10 Closing words 403 Index 407

    15 in stock

    £26.36

  • Gray Hat Hacking The Ethical Hackers Handbook

    McGraw-Hill Education Gray Hat Hacking The Ethical Hackers Handbook

    15 in stock

    Book SynopsisUp-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemyâs devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained.Fully revised conTable of ContentsPrefaceAcknowledgmentsIntroduction Part I. Preparation Chapter 1. Gray Hat Hacking Gray Hat Hacking Overview History of Hacking Ethics and Hacking Definition of Gray Hat Hacking History of Ethical Hacking History of Vulnerability Disclosure Bug Bounty Programs Know the Enemy: Black Hat Hacking Advanced Persistent Threats Lockheed Martin Cyber Kill Chain Courses of Action for the Cyber Kill Chain MITRE ATT&CK Framework Summary For Further Reading References Chapter 2. Programming Survival Skills C Programming Language Basic C Language Constructs Lab 2-1: Format Strings Lab 2-2: Loops Lab 2-3: if/else Sample Programs Lab 2-4: hello.c Lab 2-5: meet.c Compiling with gcc Lab 2-6: Compiling meet.c Computer Memory Random Access Memory Endian Segmentation of Memory Programs in Memory Buffers Strings in Memory Pointers Putting the Pieces of Memory Together Lab 2-7: memory.c Intel Processors Registers Assembly Language Basics Machine vs. Assembly vs. C AT&T vs. NASM Addressing Modes Assembly File Structure Lab 2-8: Simple Assembly Program Debugging with gdb gdb Basics Lab 2-9: Debugging Lab 2-10: Disassembly with gdb Python Survival Skills Getting Python Lab 2-11: Launching Python Lab 2-12: “Hello, World!” in Python Python Objects Lab 2-13: Strings Lab 2-14: Numbers Lab 2-15: Lists Lab 2-16: Dictionaries Lab 2-17: Files with Python Lab 2-18: Sockets with Python Summary For Further Reading References Chapter 3. Linux Exploit Development Tools Binary, Dynamic Information-Gathering Tools Lab 3-1: Hello.c Lab 3-2: ldd Lab 3-3: objdump Lab 3-4: strace Lab 3-5: ltrace Lab 3-6: checksec Lab 3-7: libc-database Lab 3-8: patchelf Lab 3-9: one_gadget Lab 3-10: Ropper Extending gdb with Python Pwntools CTF Framework and Exploit Development Library Summary of Features Lab 3-11: leak-bof.c HeapME (Heap Made Easy) Heap Analysis and Collaboration Tool Installing HeapME Lab 3-12: heapme_demo.c Summary For Further Reading References Chapter 4. Introduction to Ghidra Creating Our First Project Installation and QuickStart Setting the Project Workspace Functionality Overview Lab 4-1: Improving Readability with Annotations Lab 4-2: Binary Diffing and Patch Analysis Summary For Further Reading References Chapter 5. IDA Pro Introduction to IDA Pro for Reverse Engineering What Is Disassembly? Navigating IDA Pro IDA Pro Features and Functionality Cross-References (Xrefs) Function Calls Proximity Browser Opcodes and Addressing Shortcuts Comments Debugging with IDA Pro Summary For Further Reading References Part II. Ethical Hacking Chapter 6. Red and Purple Teams Introduction to Red Teams Vulnerability Scanning Validated Vulnerability Scanning Penetration Testing Threat Simulation and Emulation Purple Team Making Money with Red Teaming Corporate Red Teaming Consultant Red Teaming Purple Team Basics Purple Team Skills Purple Team Activities Summary For Further Reading References Chapter 7. Command and Control (C2) Command and Control Systems Metasploit Lab 7-1: Creating a Shell with Metasploit PowerShell Empire Covenant Lab 7-2: Using Covenant C2 Payload Obfuscation msfvenom and Obfuscation Lab 7-3: Obfuscating Payloads with msfvenom Creating C# Launchers Lab 7-4: Compiling and Testing C# Launchers Creating Go Launchers Lab 7-5: Compiling and Testing Go Launchers Creating Nim Launchers &n bsp; Lab 7-6: Compiling and Testing Nim Launchers Network Evasion Encryption Alternate Protocols C2 Templates EDR Evasion Killing EDR Products Bypassing Hooks Summary For Further Reading Chapter 8. Building a Threat Hunting Lab Threat Hunting and Labs Options of Threat Hunting Labs Method for the Rest of this Chapter Basic Threat Hunting Lab: DetectionLab Prerequisites Lab 8-1: Install the Lab on Your Host Lab 8-2: Install the Lab in the Cloud Lab 8-3: Looking Around the Lab Extending Your Lab HELK Lab 8-4: Install HELK Lab 8-5: Install Winlogbeat Lab 8-6: Kibana Basics Lab 8-7: Mordor Summary For Further Reading References Chapter 9. Introduction to Threat Hunting Threat Hunting Basics Types of Threat Hunting Workflow of a Threat Hunt Normalizing Data Sources with OSSEM Data Sources OSSEM to the Rescue Data-Driven Hunts Using OSSEM MITRE ATT&CK Framework Refresher: T1003.002 Lab 9-1: Visualizing Data Sources with OSSEM Lab 9-2: AtomicRedTeam Attacker Emulation Exploring Hypothesis-Driven Hunts Lab 9-3: Hypothesis that Someone Copied a SAM File Crawl, Walk, Run Enter Mordor Lab 9-4: Hypothesis that Someone Other than an Admin Launched PowerShell Threat Hunter Playbook Departure from HELK for Now Spark and Jupyter Lab 9-5: Automated Playbooks and Sharing of Analytics Summary For Further Reading References Part III. Hacking Systems Chapter 10. Basic Linux Exploits Stack Operations and Function-Calling Procedures Buffer Overflows Lab 10-1: Overflowing meet.c Ramifications of Buffer Overflows Local Buffer Overflow Exploits Lab 10-2: Components of the Exploit Lab 10-3: Exploiting Stack Overflows from the Command Line Lab 10-4: Writing the Exploit with Pwntools Lab 10-5: Exploiting Small Buffers Exploit Development Process Lab 10-6: Building Custom Exploits Summary For Further Reading Chapter 11. Advanced Linux Exploits Lab 11-1: Vulnerable Program and Environment Setup Lab 11-2: Bypassing Non-Executable Stack (NX) with Return-Oriented Programming (ROP) Lab 11-3: Defeating Stack Canaries Lab 11-4: ASLR Bypass with an Information Leak Lab 11-5: PIE Bypass with an Information Leak Summary For Further Reading References Chapter 12. Linux Kernel Exploits Lab 12-1: Environment Setup and Vulnerable procfs Module Lab 12-2: ret2usr Lab 12-3: Defeating Stack Canaries Lab 12-4: Bypassing Supervisor Mode Execution Protection (SMEP) and Kernel Page-Table Isolation (KPTI) Lab 12-5: Bypassing Supervisor Mode Access Prevention (SMAP) Lab 12-6: Defeating Kernel Address Space Layout Randomization (KASLR) Summary For Further Reading References Chapter 13. Basic Windows Exploitation Compiling and Debugging Windows Programs Lab 13-1: Compiling on Windows Debugging on Windows with Immunity Debugger Lab 13-2: Crashing the Program Writing Windows Exploits Exploit Development Process Review Lab 13-3: Exploiting ProSSHD Server Understanding Structured Exception Handling Understanding and Bypassing Common Windows Memory Protections Safe Structured Exception Handling Bypassing SafeSEH Data Execution Prevention Return-Oriented Programming Gadgets Building the ROP Chain Summary For Further Reading References Chapter 14. Windows Kernel Exploitation The Windows Kernel Kernel Drivers Kernel Debugging Lab 14-1: Setting Up Kernel Debugging Picking a Target Lab 14-2: Obtaining the Target Driver Lab 14-3: Reverse Engineering the Driver Lab 14-4: Interacting with the Driver Token Stealing Lab 14-5: Arbitrary Pointer Read/Write Lab 14-6: Writing a Kernel Exploit Summary For Further Reading References Chapter 15. PowerShell Exploitation Why PowerShell Living off the Land PowerShell Logging PowerShell Portability Loading PowerShell Scripts Lab 15-1: The Failure Condition Lab 15-2: Passing Commands on the Command Line Lab 15-3: Encoded Commands Lab 15-4: Bootstrapping via the Web Exploitation and Post-Exploitation with PowerSploit Lab 15-5: Setting Up PowerSploit Lab 15-6: Running Mimikatz Through PowerShell Using PowerShell Empire for C2 Lab 15-7: Setting Up Empire Lab 15-8: Staging an Empire C2 Lab 15-9: Using Empire to Own the System Lab 15-10: Using WinRM to Launch Empire Summary For Further Reading Reference Chapter 16. Getting Shells Without Exploits Capturing Password Hashes Understanding LLMNR and NBNS Understanding Windows NTLMv1 and NTLMv2 Authentication Using Responder Lab 16-1: Getting Passwords with Responder Using Winexe Lab 16-2: Using Winexe to Access Remote Systems Lab 16-3: Using Winexe to Gain Elevated Privileges Using WMI Lab 16-4: Querying System Information with WMI Lab 16-5: Executing Commands with WMI Taking Advantage of WinRM Lab 16-6: Executing Commands with WinRM Lab 16-7: Using Evil-WinRM to Execute Code Summary For Further Reading Reference Chapter 17. Post-Exploitation in Modern Windows Environments Post-Exploitation Host Recon Lab 17-1: Using whoami to Identify Privileges Lab 17-2: Using Seatbelt to Find User Information Lab 17-3: System Recon with PowerShell Lab 17-4: System Recon with Seatbelt Lab 17-5: Getting Domain Information with PowerShell Lab 17-6: Using PowerView for AD Recon Lab 17-7: Gathering AD Data with SharpHound Escalation Lab 17-8: Profiling Systems with winPEAS Lab 17-9: Using SharpUp to Escalate Privileges Lab 17-10: Searching for Passwords in User Objects Lab 17-11: Abusing Kerberos to Gather Credentials Lab 17-12: Abusing Kerberos to Escalate Privileges Active Directory Persistence Lab 17-13: Abusing AdminSDHolder Lab 17-14: Abusing SIDHistory Summary For Further Reading Chapter 18. Next-Generation Patch Exploitation Introduction to Binary Diffing Application Diffing Patch Diffing Binary Diffing Tools BinDiff turbodiff Lab 18-1: Our First Diff Patch Management Process Microsoft Patch Tuesday Obtaining and Extracting Microsoft Patches Summary For Further Reading References Part IV. Hacking IoT Chapter 19. Internet of Things to Be Hacked Internet of Things (IoT) Types of Connected Things Wireless Protocols Communication Protocols Security Concerns Shodan IoT Search Engine Web Interface Shodan Command-Line Interface Lab 19-1: Using the Shodan Command Line Shodan API Lab 19-2: Testing the Shodan API Lab 19-3: Playing with MQTT Implications of this Unauthenticated Access to MQTT IoT Worms: It Was a Matter of Time Prevention Summary For Further Reading References Chapter 20. Dissecting Embedded Devices CPU Microprocessor Microcontrollers System on Chip Common Processor Architectures Serial Interfaces UART SPI I2C Debug Interfaces JTAG SWD Software Bootloader No Operating System Real-Time Operating System General Operating System Summary For Further Reading References Chapter 21. Exploiting Embedded Devices Static Analysis of Vulnerabilities in Embedded Devices Lab 21-1: Analyzing the Update Package Lab 21-2: Performing Vulnerability Analysis Dynamic Analysis with Hardware The Test Environment Setup Ettercap Dynamic Analysis with Emulation FirmAE Lab 21-3: Setting Up FirmAE Lab 21-4: Emulating Firmware Lab 21-5: Exploiting Firmware Summary For Further Reading References Chapter 22. Software-Defined Radio Getting Started with SDR What to Buy Not So Quick: Know the Rules Learn by Example Search Capture Replay Analyze Preview Execute Summary For Further Reading Part V. Hacking Hypervisors Chapter 23. Hypervisors 101 What Is a Hypervisor? Popek and Goldberg Virtualization Theorems Goldberg’s Hardware Virtualizer Type-1 and Type-2 VMMs x86 Virtualization Dynamic Binary Translation Ring Compression Shadow Paging Paravirtualization Hardware Assisted Virtualization VMX EPT Summary References Chapter 24. Creating a Research Framework Hypervisor Attack Surface The Unikernel Lab 24-1: Booting and Communication Lab 24-2: Communication Protocol Boot Message Implementation Handling Requests The Client (Python) Communication Protocol (Python) Lab 24-3: Running the Guest (Python) Lab 24-4: Code Injection (Python) Fuzzing The Fuzzer Base Class Lab 24-5: IO-Ports Fuzzer Lab 24-6: MSR Fuzzer Lab 24-7: Exception Handling Fuzzing Tips and Improvements Summary References Chapter 25. Inside Hyper-V Environment Setup Hyper-V Architecture Hyper-V Components Virtual Trust Levels Generation-1 VMs Lab 25-1: Scanning PCI Devices in a Generation-1 V

    15 in stock

    £34.49

  • An Elementary Introduction to the Wolfram

    Wolfram Media Inc An Elementary Introduction to the Wolfram

    15 in stock

    Book Synopsis

    15 in stock

    £21.21

  • CTSD Certified Technology SpecialistDesign Exam

    McGraw-Hill Education CTSD Certified Technology SpecialistDesign Exam

    15 in stock

    Book SynopsisThe most up to date CTS-D exam study systemâavailable exclusively from McGraw Hill and AVIXA PressPublished with AVIXA , CTS-D Certified Technology Specialist-Design Exam Guide, Second Edition provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisual design professionals. Each chapter features learning objectives, best practices, diagrams, photos, and chapter review questions with in-depth explanations. Designed to help you prepare for the CTS-D exam, this authoritative resource also serves as an essential on-the-job reference.<Online content includes: New CTS-D sample questions from AVIXA Link to a library of design, installation, and AV math videos Link to AVIXA standards Link to AVIXAâs AV standards Clearing House Covers all CTS-D exam objectives, including: Communicating design intent Ergonomics in AV designTable of ContentsPART IThe Certified Technology Specialist-DesignCH 1: What is a Certified Technology Specialist-Design?CH 2: The CTS-D ExamPART IIEnvironmentCH 3: Communicating Design IntentCH 4: Ergonomics in AV DesignCH 5: Visual Principles of DesignCH 6: Audio Principles of DeisngPART IIIInfrastructureCH 7: Communicating with Allied TradesCH 8: Lighting SpecificationsCH 9: Structural and Mechanical ConsiderationsCH 10: Specifying Electrical InfrastructureCH 11: Elements of AcousticsPART IVApplied DesignCH 12: Digital SignalsCH 13: Digital Video DesignCH 14: Audio DesignCH 15: Control RequirementsCH 16: Networking for AVCH 17: Streaming DesignCH 18: Security for Networked AV ApplicationsCH 19: Conducting Project Implementation ActivitiesPART VAppendices & GlossaryApp A: Math Formulas Used in AV InstallationsApp B: AVIXA StandardsApp C: AVIXA AV Standards ClearinghouseApp D: Video ReferencesApp E: About the Online Content

    15 in stock

    £47.24

  • RealTime Rendering Fourth Edition

    Taylor & Francis Ltd RealTime Rendering Fourth Edition

    1 in stock

    Book SynopsisReal-Time Rendering combines fundamental principles with guidance on the latest techniques to provide a complete reference on three-dimensional interactive computer graphics. It will help you increase speed and improve image quality and learn the features and limitations of acceleration algorithms and graphics APIs. This latest fourth edition has been updated to include a chapter on virtual reality and augmented reality and covers new topics such as visual appearance, global illumination, and curves and curved surfaces.It is for anyone serious about computer graphics who wants to learn about algorithms that create synthetic images fast enough that the viewer can interact with a virtual environment.ReviewsThis is the book I recommend to everyone starting out in the industry. Not only is it a great reference on so many topics, each topic is covered in impressive depth with great references for further exploration. â Alex Vlachos, Valve<Table of Contentschapter 1 Introductionchapter 2 The Graphics Rendering Pipelinechapter 3 The Graphics Processing Unitchapter 4 Transformschapter 5 Shading Basicschapter 6 Texturingchapter 7 Shadowschapter 8 Light and Colorchapter 9 Physically-Based Shadingchapter 10 Local Illuminationchapter 11 Global Illuminationchapter 12 Image-Space Effectschapter 13 Beyond Polygonschapter 14 Volumetric and Translucency Renderingchapter 15 Non-Photorealistic Renderingchapter 16 Polygonal Techniqueschapter 17 Curves and Curved Surfaceschapter 18 Pipeline Optimizationchapter 19 Acceleration Algorithmschapter 20 Effcient Shadingchapter 21 Virtual and Augmented Realitychapter 22 Intersection Test Methodschapter 23 Graphics Hardwarechapter 24 The Future

    1 in stock

    £78.84

  • Blue Fox

    John Wiley & Sons Inc Blue Fox

    15 in stock

    Book SynopsisTable of ContentsIntroduction xxi Part I Arm Assembly Internals 1 Chapter 1 Introduction to Reverse Engineering 3 Introduction to Assembly 3 Bits and Bytes 3 Character Encoding 5 Machine Code and Assembly 6 Assembling 9 Cross- Assemblers 13 High- Level Languages 15 Disassembling 16 Decompilation 17 Chapter 2 ELF File Format Internals 21 Program Structure 21 High- Level vs. Low- Level Languages 22 The Compilation Process 24 Cross- Compiling for Other Architectures 25 Assembling and Linking 27 The ELF File Overview 30 The ELF File Header 31 The ELF File Header Information Fields 32 The Target Platform Fields 33 The Entry Point Field 34 The Table Location Fields 34 ELF Program Headers 34 The PHDR Program Header 36 The INTERP Program Header 36 The LOAD Program Headers 36 The DYNAMIC Program Header 37 The NOTE Program Header 37 The TLS Program Header 38 The GNU_EH_FRAME Program Header 38 The GNU_STACK Program Header 39 The GNU_RELRO Program Header 41 ELF Section Headers 43 The ELF Meta- Sections 45 The String Table Section 46 The Symbol Table Section 46 The Main ELF Sections 46 The .text Section 47 The .data Section 47 The .bss Section 47 The .rodata Section 47 The .tdata and .tbss Sections 48 Symbols 48 Global vs. Local Symbols 50 Weak Symbols 50 Symbol Versions 51 Mapping Symbols 51 The Dynamic Section and Dynamic Loading 52 Dependency Loading (NEEDED) 53 Program Relocations 54 Static Relocations 55 Dynamic Relocations 56 The Global Offset Table (GOT) 57 The Procedure Linkage Table (PLT) 57 The ELF Program Initialization and Termination Sections 58 Initialization and Termination Order 60 Thread- Local Storage 60 The Local- Exec TLS Access Model 65 The Initial- Exec TLS Access Model 65 The General- Dynamic TLS Access Model 66 The Local- Dynamic TLS Access Model 67 Chapter 3 OS Fundamentals 69 OS Architecture Overview 69 User Mode vs. Kernel Mode 70 Processes 70 System Calls 72 Objects and Handles 77 Threads 79 Process Memory Management 80 Memory Pages 82 Memory Protections 82 Anonymous and Memory- Mapped Memory 84 Memory- Mapped Files and Modules 84 Address Space Layout Randomization 87 Stack Implementations 90 Shared Memory 91 Chapter 4 The Arm Architecture 93 Architectures and Profiles 93 The Armv8- A Architecture 95 Exception Levels 96 Armv8- A TrustZone Extension 97 Exception Level Changes 99 Armv8- A Execution States 101 The AArch64 Execution State 102 The A64 Instruction Set 103 AArch64 Registers 104 The Program Counter 106 The Stack Pointer 107 The Zero Register 107 The Link Register 108 The Frame Pointer 109 The Platform Register (x18) 109 The Intraprocedural Call Registers 110 SIMD and Floating- Point Registers 110 System Registers 111 PSTATE 112 The AArch32 Execution State 114 A32 and T32 Instruction Sets 114 The A32 Instruction Set 114 The T32 Instruction Set 115 Switching Between Instruction Sets 115 AArch32 Registers 118 The Program Counter 119 The Stack Pointer 120 The Frame Pointer 120 The Link Register 121 The Intraprocedural Call Register (IP, r12) 121 The Current Program Status Register 121 The Application Program Status Register 122 The Execution State Registers 124 The Instruction Set State Register 124 The IT Block State Register (ITSTATE) 125 Endianness state 126 Mode and Exception Mask Bits 126 Chapter 5 Data Processing Instructions 129 Shift and Rotate Operations 131 Logical Shift Left 132 Logical Shift Right 133 Arithmetic Shift Right 133 Rotate Right 134 Rotate Right with Extend 134 Instruction Forms 135 Shift by a Constant Immediate Form 136 Shift by Register Form 138 Bitfield Manipulation Operations 140 Bitfield Move 141 Sign- and Zero- Extend Operations 145 Bitfield Extract and Insert 150 Logical Operations 153 Bitwise AND 153 The TST Instruction 154 Bitwise Bit Clear 155 Bitwise OR 155 Bitwise OR NOT 156 Bitwise Exclusive OR 158 The TEQ instruction 158 Exclusive OR NOT 159 Arithmetic Operations 159 Addition and Subtraction 159 Reverse Subtract 161 Compare 162 CMP Instruction Operation Behavior 163 Multiplication Operations 165 Multiplications on A64 166 Multiplications on A32/T32 167 Least Significant Word Multiplications 169 Most Significant Word Multiplications 171 Halfword Multiplications 173 Vector (Dual) Multiplications 176 Long (64- Bit) Multiplications 179 Division Operations 186 Move Operations 187 Move Constant Immediate 188 Move Immediate and MOVT on A32/T32 188 Move Immediate, MOVZ, and MOVK on A64 189 Move Register 190 Move with NOT 192 Chapter 6 Memory Access Instructions 195 Instructions Overview 195 Addressing Modes and Offset Forms 197 Offset Addressing 200 Constant Immediate Offset 201 Register Offsets 207 Pre- Indexed Mode 209 Pre- Indexed Mode Example 210 Post- Indexed Addressing 212 Post- Indexed Addressing Example 213 Literal (PC- Relative) Addressing 214 Loading Constants 215 Loading an Address into a Register 218 Load and Store Instructions 222 Load and Store Word or Doubleword 222 Load and Store Halfword or Byte 224 Example Using Load and Store 226 Load and Store Multiple (A32) 228 Example for STM and LDM 235 A More Complicated Example Using STM and LDM 237 Load and Store Pair (A64) 238 Chapter 7 Conditional Execution 243 Conditional Execution Overview 243 Conditional Codes 244 The NZCV Condition Flags 245 Signed vs. Unsigned Integer Overflows 246 Condition Codes 248 Conditional Instructions 249 The If- Then (IT) Instruction in Thumb 250 Flag- Setting Instructions 252 The Instruction “S” Suffix 253 The S Suffix on Add and Subtract Instructions 253 The S Suffix on Logical Shift Instructions 256 The S Suffix on Multiply Instructions 257 The S Suffix on Other Instructions 257 Test and Comparison Instructions 257 Compare (CMP) 258 Compare Negative (CMN) 260 Test Bits (TST) 261 Test Equality (TEQ) 264 Conditional Select Instructions 265 Conditional Comparison Instructions 268 Boolean AND Conditionals Using CCMP 269 Boolean OR Conditionals Using CCMP 272 Chapter 8 Control Flow 275 Branch Instructions 275 Conditional Branches and Loops 277 Test and Compare Branches 281 Table Branches (T32) 282 Branch and Exchange 284 Subroutine Branches 288 Functions and Subroutines 290 The Procedure Call Standard 291 Volatile vs. Nonvolatile Registers 293 Arguments and Return Values 293 Passing Larger Values 295 Leaf and Nonleaf Functions 298 Leaf Functions 298 Nonleaf Functions 299 Prologue and Epilogue 299 Part II Reverse Engineering 305 Chapter 9 Arm Environments 307 Arm Boards 308 Emulation with QEMU 310 QEMU User- Mode Emulation 310 QEMU Full- System Emulation 314 Firmware Emulation 315 Chapter 10 Static Analysis 321 Static Analysis Tools 322 Command- Line Tools 322 Disassemblers and Decompilers 322 Binary Ninja Cloud 323 Call- By- Reference Example 328 Control Flow Analysis 334 Main Function 336 Subroutine 336 Converting to char 341 if Statement 343 Quotient Division 345 for Loop 347 Analyzing an Algorithm 349 Chapter 11 Dynamic Analysis 363 Command- Line Debugging 364 GDB Commands 365 GDB Multiuser 366 GDB Extension: GEF 368 Installation 369 Interface 370 Useful GEF Commands 370 Examine Memory 374 Watch Memory Regions 376 Vulnerability Analyzers 377 checksec 379 Radare2 381 Debugging 382 Remote Debugging 385 Radare2 386 IDA Pro 388 Debugging a Memory Corruption 390 Debugging a Process with GDB 398 Chapter 12 Reversing arm64 macOS Malware 405 Background 406 macOS arm64 Binaries 407 macOS Hello World (arm64) 410 Hunting for Malicious arm64 Binaries 413 Analyzing arm64 Malware 419 Anti- Analysis Techniques 420 Anti- Debugging Logic (via ptrace) 421 Anti- Debugging Logic (via sysctl) 425 Anti- VM Logic (via SIP Status and the Detection of VM Artifacts) 429 Conclusion 435 Index 437

    15 in stock

    £26.24

  • CEH Certified Ethical Hacker Bundle Fifth Edition

    McGraw-Hill Education CEH Certified Ethical Hacker Bundle Fifth Edition

    15 in stock

    Book SynopsisThoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what theyâve learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams.This edition features up-to-date coverage of all nine domains of the CEH v11 exam and the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaingin  access and clearing tracks.In all, the bundle includes more than 900 accurate questions with deta

    15 in stock

    £34.49

  • CISM Certified Information Security Manager

    McGraw-Hill Education CISM Certified Information Security Manager

    15 in stock

    Book SynopsisUp-to-date practice questions that cover every topic on the 2022 version of the CISM examTake the current version of the challenging CISM exam with complete confidence using the detailed information contained in this fully updated self-study guide. Written by an expert in the field, the book features hundreds of practice exam questions that match those on the live test in content, format, tone, and feel. In-depth answer explanations are provided for both the correct and incorrect answer choices. CISM Certified Information Security Manager Practice Exams, Second Edition supplements the CISM All-in-One Exam Guide and completely covers every objective of the 2022 exam release. In total, the book contains more than 300 realistic practice questions.â  Offers 100% coverage of all four CISM exam domainsâ  Online content includes access to an additional 150 practice questions in the TotalTester

    15 in stock

    £26.99

  • CSSLP Certified Secure Software Lifecycle

    McGraw-Hill Education CSSLP Certified Secure Software Lifecycle

    15 in stock

    Book SynopsisProviding 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the examGet complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC)2 . Youâll find learning objectives at the beginning of each chapter, exam tips, and practice questions with explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference.Covers all eight exam domains: Secure Software Concepts Secure Software Requirements Secure Software Architecture and Design Secure Software Implementation Secure Software Testing Secure Software Lifecycle Management Secure Soft

    15 in stock

    £40.49

  • Lean IT

    Taylor & Francis Lean IT

    2 in stock

    Book SynopsisWinner of a Shingo Research and Professional Publication AwardInformation Technology is supposed to enable business performance and innovation, improve service levels, manage change, and maintain quality and stability, all while steadily reducing operating costs. Yet when an enterprise begins a Lean transformation, too often the IT department is either left out or viewed as an obstacle. What is to be done? Winner of a 2011 Shingo Research and Professional Publication Award, this book shares practical tips, examples, and case studies to help you establish a culture of continuous improvement to deliver IT operational excellence and business value to your organization. Praise for:...will have a permanent place in my bookshelf.âGene Kim, Chief Technology Officer, Tripwire, Inc.... provides an unprecedented look at the role that Lean IT will play in making this revolutionary shift and the critical steps for sustained succeTrade ReviewThis book will have a permanent place in my bookshelf. In my ten-year study of high performing IT organizations, I’ve found that businesses rely on IT far more than they think. The impacts of poor flow from application development into IT operations can be devastating: ever increasing cycle times and amounts of rework, and an ever increasing amount of heroics required in IT operations to preserve the illusion of stability and reliability.—Gene Kim, Chief Technology Officer, Tripwire, Inc.; co-author of The Visible Ops Handbook and Visible Ops Security There has never been a more critical time to improve how IT integrates with the global business enterprise. This book provides an unprecedented look at the role that Lean will play in making this revolutionary shift and the critical steps for sustained success.—Steve Castellanos, Lean Enterprise Director; Nike, Inc. Twenty years from now the firms which dominate their industries will have fully embraced lean strategies throughout their IT organizations. Ten years from now those organizations will have started pulling ahead of their competitors as the result of lean IT. Today this book will show those organizations the path they need to start out on. Will your organization be one of them?—Scott W. Ambler, Chief Methodologist for Agile and Lean, IBM Rational; author of Agile Modeling and Enterprise Unified Process This book goes both wide and deep in its exploration of Lean … a great survival manual for those needing nimble and adaptive systems.—Dr. David Labby, MD, PhD, Medical Director and Director of Clinical Support and Innovation, CareOregon This book makes a major contribution in an often-ignored but much-needed area. It ranges over a huge area – including excellent cases – that will bring IT professionals into the Lean fold but will also enable Lean managers to reach out to IT.—John Bicheno, Program Director MS in Lean Operations, Cardiff University … a comprehensive view into the world of Lean IT, a must read!—Dave Wilson, Quality Management, Oregon Health & Science University This book will have a permanent place in my bookshelf. In my ten-year study of high performing IT organizations, I’ve found that businesses rely on IT far more than they think. The impacts of poor flow from application development into IT operations can be devastating: ever increasing cycle times and amounts of rework, and an ever increasing amount of heroics required in IT operations to preserve the illusion of stability and reliability.—Gene Kim, Chief Technology Officer, Tripwire, Inc. There has never been a more critical time to improve how IT integrates with the global business enterprise. This book provides an unprecedented look at the role that Lean will play in making this revolutionary shift and the critical steps for sustained success.—Steve Castellanos, Lean Enterprise Director; Nike, Inc. Twenty years from now the firms which dominate their industries will have fully embraced lean strategies throughout their IT organizations. Ten years from now those organizations will have started pulling ahead of their competitors as the result of lean IT. Today this book will show those organizations the path they need to start out on. Will your organization be one of them?—Scott W. Ambler, Chief Methodologist for Agile and Lean, IBM Rational ... goes both wide and deep in its exploration of Lean … a great survival manual for those needing nimble and adaptive systems.—Dr. David Labby, MD, PhD, Medical Director and Director of Clinical Support and Innovation, CareOregon This book makes a major contribution in an often-ignored but much-needed area. It ranges over a huge area – including excellent cases – that will bring IT professionals into the Lean fold but will also enable Lean managers to reach out to IT.—John Bicheno, Program Director MS in Lean Operations, Cardiff University … a comprehensive view into the world of Lean IT, a must read!—Dave Wilson, Quality Management, Oregon Health & Science University Table of ContentsFoundation. Integration. Performance. Leadership Roadmap. Lean IT Case Studies.

    2 in stock

    £47.49

  • The Elements of Statistical Learning Springer

    Springer-Verlag New York Inc. The Elements of Statistical Learning Springer

    7 in stock

    Book SynopsisOverview of Supervised Learning.- Linear Methods for Regression.- Linear Methods for Classification.- Basis Expansions and Regularization.- Kernel Smoothing Methods.- Model Assessment and Selection.- Model Inference and Averaging.- Additive Models, Trees, and Related Methods.- Boosting and Additive Trees.- Neural Networks.- Support Vector Machines and Flexible Discriminants.- Prototype Methods and Nearest-Neighbors.- Unsupervised Learning.- Random Forests.- Ensemble Learning.- Undirected Graphical Models.- High-Dimensional Problems: p ? N.Trade ReviewFrom the reviews:"Like the first edition, the current one is a welcome edition to researchers and academicians equally…. Almost all of the chapters are revised.… The Material is nicely reorganized and repackaged, with the general layout being the same as that of the first edition.… If you bought the first edition, I suggest that you buy the second editon for maximum effect, and if you haven’t, then I still strongly recommend you have this book at your desk. Is it a good investment, statistically speaking!" (Book Review Editor, Technometrics, August 2009, VOL. 51, NO. 3)From the reviews of the second edition:"This second edition pays tribute to the many developments in recent years in this field, and new material was added to several existing chapters as well as four new chapters … were included. … These additions make this book worthwhile to obtain … . In general this is a well written book which gives a good overview on statistical learning and can be recommended to everyone interested in this field. The book is so comprehensive that it offers material for several courses." (Klaus Nordhausen, International Statistical Review, Vol. 77 (3), 2009)“The second edition … features about 200 pages of substantial new additions in the form of four new chapters, as well as various complements to existing chapters. … the book may also be of interest to a theoretically inclined reader looking for an entry point to the area and wanting to get an initial understanding of which mathematical issues are relevant in relation to practice. … this is a welcome update to an already fine book, which will surely reinforce its status as a reference.” (Gilles Blanchard, Mathematical Reviews, Issue 2012 d)“The book would be ideal for statistics graduate students … . This book really is the standard in the field, referenced in most papers and books on the subject, and it is easy to see why. The book is very well written, with informative graphics on almost every other page. It looks great and inviting. You can flip the book open to any page, read a sentence or two and be hooked for the next hour or so.” (Peter Rabinovitch, The Mathematical Association of America, May, 2012)Table of ContentsIntroduction.- Overview of supervised learning.- Linear methods for regression.- Linear methods for classification.- Basis expansions and regularization.- Kernel smoothing methods.- Model assessment and selection.- Model inference and averaging.- Additive models, trees, and related methods.- Boosting and additive trees.- Neural networks.- Support vector machines and flexible discriminants.- Prototype methods and nearest-neighbors.- Unsupervised learning.

    7 in stock

    £58.49

  • Twitter and Tear Gas

    Yale University Press Twitter and Tear Gas

    15 in stock

    Book SynopsisA firsthand account and incisive analysis of modern protest, revealing internet-fueled social movements’ greatest strengths and frequent challengesTrade Review“Tufekci believes that digital-age protests are not simply faster, more responsive versions of their mid-century parents. They are fundamentally distinct.”—Nathan Heller, New Yorker"This comprehensive, thought-provoking work makes a valuable contribution to understanding recent political developments and provides a clear path by which grassroots organizers can improve future efforts."—Publishers Weekly"Twitter and Tear Gas is packed with evidence on how social media has changed social movements, based on rigorous research and placed in historical context."—Hannah Kuchler, Financial Times“Tufecki has written an important book that offers a granular assessment of contemporary digital protest. . . Altogether, Tufecki offers a textured chronicle of the dynamics of several movements and the hopes of activists.”—Silvio Waisbord, Social Forces"A striking and original conclusion: today’s low barrier for organizing a movement can also lead to its long-term frustrations. Tufekci’s superb book will define the debate on social protest for years to come."—Dani Rodrik, author of Economic Rules: The Rights and Wrongs of the Dismal Science"Tufekci is undoubtedly the most qualified person in the world to explain the meaning of political collective actions catalyzed and coordinated by social media. She knows the technology, the social science, and the politics—and she is the rare academic observer who was at the scene, from Istanbul to Cairo to New York."—Howard Rheingold, author of Smart Mobs: The Next Social Revolution"Incisive and illuminating, Tufekci’s book arrives at the perfect moment, right when we desperately need our activism to become smarter and more effective than ever before, or else."— Astra Taylor, author of The People’s Platform: Taking Back Power and Culture in the Digital Age and co-founder of the Debt Collective"Many have asked why people rebel, but few describe how. Here, Tufekci uses firsthand observation to offer an intelligent and informed examination of the tools and nature of today’s political protests."—Vali Nasr, author of The Dispensable Nation and The Shia Revival"For all the claims that new technologies afford grassroots movements new power, research on the topic is rare. Tufekci's book provides just that—and a cautionary conclusion."—Doug McAdam, author of Deeply Divided: Racial Politics and Social Movements in Postwar America

    15 in stock

    £11.99

  • CEH Certified Ethical Hacker AllinOne Exam Guide

    McGraw-Hill Education CEH Certified Ethical Hacker AllinOne Exam Guide

    15 in stock

    Book SynopsisUp-to-date coverage of every topic on the CEH v11 examThoroughly updated for CEH v11 exam objectives, this integrated self-study system offers complete coverage of the EC-Councilâs Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference.Covers all exam topics, including: Ethical hacking fundamentals Reconnaissance and footprinting Scanning and enumeration Sniffing and evasion Attacking a system Hacking web servers and applications Wireless network hacking Mobile, IoT, and OT Security in cloud computing Trojans and other attacks, incl

    15 in stock

    £31.19

  • Artificial Intelligence Hardware Design

    John Wiley & Sons Inc Artificial Intelligence Hardware Design

    15 in stock

    Book SynopsisARTIFICIAL INTELLIGENCE HARDWARE DESIGN Learn foundational and advanced topics in Neural Processing Unit design with real-world examples from leading voices in the field In Artificial Intelligence Hardware Design: Challenges and Solutions, distinguished researchers and authors Drs. Albert Chun Chen Liu and Oscar Ming Kin Law deliver a rigorous and practical treatment of the design applications of specific circuits and systems for accelerating neural network processing. Beginning with a discussion and explanation of neural networks and their developmental history, the book goes on to describe parallel architectures, streaming graphs for massive parallel computation, and convolution optimization. The authors offer readers an illustration of in-memory computation through Georgia Tech's Neurocube and Stanford's Tetris accelerator using the Hybrid Memory Cube, as well as near-memory architecture through the embedded eDRAM of the Institute of Computing TechnologTable of ContentsAuthor Biographies xi Preface xiii Acknowledgments xv Table of Figures xvii 1 Introduction 1 1.1 Development History 2 1.2 Neural Network Models 4 1.3 Neural Network Classification 4 1.3.1 Supervised Learning 4 1.3.2 Semi-supervised Learning 5 1.3.3 Unsupervised Learning 6 1.4 Neural Network Framework 6 1.5 Neural Network Comparison 10 Exercise 11 References 12 2 Deep Learning 13 2.1 Neural Network Layer 13 2.1.1 Convolutional Layer 13 2.1.2 Activation Layer 17 2.1.3 Pooling Layer 18 2.1.4 Normalization Layer 19 2.1.5 Dropout Layer 20 2.1.6 Fully Connected Layer 20 2.2 Deep Learning Challenges 22 Exercise 22 References 24 3 Parallel Architecture 25 3.1 Intel Central Processing Unit (CPU) 25 3.1.1 Skylake Mesh Architecture 27 3.1.2 Intel Ultra Path Interconnect (UPI) 28 3.1.3 Sub Non-unified Memory Access Clustering (SNC) 29 3.1.4 Cache Hierarchy Changes 31 3.1.5 Single/Multiple Socket Parallel Processing 32 3.1.6 Advanced Vector Software Extension 33 3.1.7 Math Kernel Library for Deep Neural Network (MKL-DNN) 34 3.2 NVIDIA Graphics Processing Unit (GPU) 39 3.2.1 Tensor Core Architecture 41 3.2.2 Winograd Transform 44 3.2.3 Simultaneous Multithreading (SMT) 45 3.2.4 High Bandwidth Memory (HBM2) 46 3.2.5 NVLink2 Configuration 47 3.3 NVIDIA Deep Learning Accelerator (NVDLA) 49 3.3.1 Convolution Operation 50 3.3.2 Single Data Point Operation 50 3.3.3 Planar Data Operation 50 3.3.4 Multiplane Operation 50 3.3.5 Data Memory and Reshape Operations 51 3.3.6 System Configuration 51 3.3.7 External Interface 52 3.3.8 Software Design 52 3.4 Google Tensor Processing Unit (TPU) 53 3.4.1 System Architecture 53 3.4.2 Multiply–Accumulate (MAC) Systolic Array 55 3.4.3 New Brain Floating-Point Format 55 3.4.4 Performance Comparison 57 3.4.5 Cloud TPU Configuration 58 3.4.6 Cloud Software Architecture 60 3.5 Microsoft Catapult Fabric Accelerator 61 3.5.1 System Configuration 64 3.5.2 Catapult Fabric Architecture 65 3.5.3 Matrix-Vector Multiplier 65 3.5.4 Hierarchical Decode and Dispatch (HDD) 67 3.5.5 Sparse Matrix-Vector Multiplication 68 Exercise 70 References 71 4 Streaming Graph Theory 73 4.1 Blaize Graph Streaming Processor 73 4.1.1 Stream Graph Model 73 4.1.2 Depth First Scheduling Approach 75 4.1.3 Graph Streaming Processor Architecture 76 4.2 Graphcore Intelligence Processing Unit 79 4.2.1 Intelligence Processor Unit Architecture 79 4.2.2 Accumulating Matrix Product (AMP) Unit 79 4.2.3 Memory Architecture 79 4.2.4 Interconnect Architecture 79 4.2.5 Bulk Synchronous Parallel Model 81 Exercise 83 References 84 5 Convolution Optimization 85 5.1 Deep Convolutional Neural Network Accelerator 85 5.1.1 System Architecture 86 5.1.2 Filter Decomposition 87 5.1.3 Streaming Architecture 90 5.1.3.1 Filter Weights Reuse 90 5.1.3.2 Input Channel Reuse 92 5.1.4 Pooling 92 5.1.4.1 Average Pooling 92 5.1.4.2 Max Pooling 93 5.1.5 Convolution Unit (CU) Engine 94 5.1.6 Accumulation (ACCU) Buffer 94 5.1.7 Model Compression 95 5.1.8 System Performance 95 5.2 Eyeriss Accelerator 97 5.2.1 Eyeriss System Architecture 97 5.2.2 2D Convolution to 1D Multiplication 98 5.2.3 Stationary Dataflow 99 5.2.3.1 Output Stationary 99 5.2.3.2 Weight Stationary 101 5.2.3.3 Input Stationary 101 5.2.4 Row Stationary (RS) Dataflow 104 5.2.4.1 Filter Reuse 104 5.2.4.2 Input Feature Maps Reuse 106 5.2.4.3 Partial Sums Reuse 106 5.2.5 Run-Length Compression (RLC) 106 5.2.6 Global Buffer 108 5.2.7 Processing Element Architecture 108 5.2.8 Network-on- Chip (NoC) 108 5.2.9 Eyeriss v2 System Architecture 112 5.2.10 Hierarchical Mesh Network 116 5.2.10.1 Input Activation HM-NoC 118 5.2.10.2 Filter Weight HM-NoC 118 5.2.10.3 Partial Sum HM-NoC 119 5.2.11 Compressed Sparse Column Format 120 5.2.12 Row Stationary Plus (RS+) Dataflow 122 5.2.13 System Performance 123 Exercise 125 References 125 6 In-Memory Computation 127 6.1 Neurocube Architecture 127 6.1.1 Hybrid Memory Cube (HMC) 127 6.1.2 Memory Centric Neural Computing (MCNC) 130 6.1.3 Programmable Neurosequence Generator (PNG) 131 6.1.4 System Performance 132 6.2 Tetris Accelerator 133 6.2.1 Memory Hierarchy 133 6.2.2 In-Memory Accumulation 133 6.2.3 Data Scheduling 135 6.2.4 Neural Network Vaults Partition 136 6.2.5 System Performance 137 6.3 NeuroStream Accelerator 138 6.3.1 System Architecture 138 6.3.2 NeuroStream Coprocessor 140 6.3.3 4D Tiling Mechanism 140 6.3.4 System Performance 141 Exercise 143 References 143 7 Near-Memory Architecture 145 7.1 DaDianNao Supercomputer 145 7.1.1 Memory Configuration 145 7.1.2 Neural Functional Unit (NFU) 146 7.1.3 System Performance 149 7.2 Cnvlutin Accelerator 150 7.2.1 Basic Operation 151 7.2.2 System Architecture 151 7.2.3 Processing Order 154 7.2.4 Zero-Free Neuron Array Format (ZFNAf) 155 7.2.5 The Dispatcher 155 7.2.6 Network Pruning 157 7.2.7 System Performance 157 7.2.8 Raw or Encoded Format (RoE) 158 7.2.9 Vector Ineffectual Activation Identifier Format (VIAI) 159 7.2.10 Ineffectual Activation Skipping 159 7.2.11 Ineffectual Weight Skipping 161 Exercise 161 References 161 8 Network Sparsity 163 8.1 Energy Efficient Inference Engine (EIE) 163 8.1.1 Leading Nonzero Detection (LNZD) Network 163 8.1.2 Central Control Unit (CCU) 164 8.1.3 Processing Element (PE) 164 8.1.4 Deep Compression 166 8.1.5 Sparse Matrix Computation 167 8.1.6 System Performance 169 8.2 Cambricon-X Accelerator 169 8.2.1 Computation Unit 171 8.2.2 Buffer Controller 171 8.2.3 System Performance 174 8.3 SCNN Accelerator 175 8.3.1 SCNN PT-IS-CP-Dense Dataflow 175 8.3.2 SCNN PT-IS-CP-Sparse Dataflow 177 8.3.3 SCNN Tiled Architecture 178 8.3.4 Processing Element Architecture 179 8.3.5 Data Compression 180 8.3.6 System Performance 180 8.4 SeerNet Accelerator 183 8.4.1 Low-Bit Quantization 183 8.4.2 Efficient Quantization 184 8.4.3 Quantized Convolution 185 8.4.4 Inference Acceleration 186 8.4.5 Sparsity-Mask Encoding 186 8.4.6 System Performance 188 Exercise 188 References 188 9 3D Neural Processing 191 9.1 3D Integrated Circuit Architecture 191 9.2 Power Distribution Network 193 9.3 3D Network Bridge 195 9.3.1 3D Network-on-Chip 195 9.3.2 Multiple-Channel High-Speed Link 195 9.4 Power-Saving Techniques 198 9.4.1 Power Gating 198 9.4.2 Clock Gating 199 Exercise 200 References 201 Appendix A: Neural Network Topology 203 Index 205

    15 in stock

    £82.76

  • Information Security

    John Wiley & Sons Inc Information Security

    15 in stock

    Book SynopsisProvides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, security protocols, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data. Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software developTable of ContentsPreface xv About The Author xix Acknowledgments xxi 1 Introductions 1 1.1 The Cast of Characters 1 1.2 Alice's Online Bank 2 1.2.1 Confidentiality, Integrity, and Availability 2 1.2.2 Beyond CIA 2 1.3 About This Book 4 1.3.1 Cryptography 4 1.3.2 Access Control 5 1.3.3 Network Security 6 1.3.4 Software 6 1.4 The People Problem 7 1.5 Principles and Practice 7 1.6 Problems 8 I Crypto 13 2 Classic Cryptography 15 2.1 Introduction 15 2.2 How to Speak Crypto 15 2.3 Classic Crypto 17 2.3.1 Simple Substitution Cipher 18 2.3.2 Cryptanalysis of a Simple Substitution 20 2.3.3 Definition of Secure 21 2.3.4 Double Transposition Cipher 22 2.3.5 One-Time Pad 23 2.3.6 Codebook Cipher 27 viii CONTENTS 2.4 Classic Crypto in History 28 2.4.1 Ciphers of the Election of 1876 28 2.4.2 Zimmermann Telegram 30 2.4.3 Project VENONA 32 2.5 Modern Crypto History 33 2.6 A Taxonomy of Cryptography 36 2.7 A Taxonomy of Cryptanalysis 37 2.8 Summary 39 2.9 Problems 39 3 Symmetric Ciphers 45 3.1 Introduction 45 3.2 Stream Ciphers 46 3.2.1 A5/1 47 3.2.2 RC4 49 3.3 Block Ciphers 51 3.3.1 Feistel Cipher 51 3.3.2 DES 52 3.3.3 Triple DES 57 3.3.4 AES 59 3.3.5 TEA 62 3.3.6 Block Cipher Modes 64 3.4 Integrity 68 3.5 Quantum Computers and Symmetric Crypto 70 3.6 Summary 72 3.7 Problems 72 4 Public Key Crypto 79 4.1 Introduction 79 4.2 Knapsack 82 4.3 RSA 85 4.3.1 Textbook RSA Example 87 4.3.2 Repeated Squaring 88 4.3.3 Speeding Up RSA 90 4.4 Diffie-Hellman 91 4.5 Elliptic Curve Cryptography 93 4.5.1 Elliptic Curve Math 93 4.5.2 ECC Diffie-Hellman 95 4.5.3 Realistic Elliptic Curve Example 96 4.6 Public Key Notation 97 4.7 Uses for Public Key Crypto 98 4.7.1 Confidentiality in the Real World 98 4.7.2 Signatures and Non-repudiation 99 CONTENTS ix 4.7.3 Confidentiality and Non-repudiation 99 4.8 Certificates and PKI 102 4.9 Quantum Computers and Public Key 104 4.10 Summary 106 4.11 Problems 106 5 Crypto Hash Functions++ 115 5.1 Introduction 115 5.2 What is a Cryptographic Hash Function? 116 5.3 The Birthday Problem 117 5.4 A Birthday Attack 119 5.5 Non-Cryptographic Hashes 120 5.6 SHA-3 121 5.7 HMAC 124 5.8 Cryptographic Hash Applications 126 5.8.1 Online Bids 126 5.8.2 Blockchain 127 5.9 Miscellaneous Crypto-Related Topics 136 5.9.1 Secret Sharing 136 5.9.2 Random Numbers 140 5.9.3 Information Hiding 143 5.10 Summary 147 5.11 Problems 147 II Access Control 159 6 Authentication 161 6.1 Introduction 161 6.2 Authentication Methods 162 6.3 Passwords 163 6.3.1 Keys Versus Passwords 164 6.3.2 Choosing Passwords 164 6.3.3 Attacking Systems via Passwords 166 6.3.4 Password Verification 167 6.3.5 Math of Password Cracking 168 6.3.6 Other Password Issues 173 6.4 Biometrics 174 6.4.1 Types of Errors 176 6.4.2 Biometric Examples 176 6.4.3 Biometric Error Rates 181 6.4.4 Biometric Conclusions 182 6.5 Something You Have 182 x CONTENTS 6.6 Two-Factor Authentication 183 6.7 Single Sign-On and Web Cookies 183 6.8 Summary 184 6.9 Problems 185 7 Authorization 195 7.1 Introduction 195 7.2 A Brief History of Authorization 196 7.2.1 The Orange Book 196 7.2.2 The Common Criteria 199 7.3 Access Control Matrix 200 7.3.1 ACLs and Capabilities 201 7.3.2 Confused Deputy 202 7.4 Multilevel Security Models 204 7.4.1 Bell-LaPadula 206 7.4.2 Biba's Model 207 7.4.3 Compartments 208 7.5 Covert Channels 210 7.6 Inference Control 212 7.7 CAPTCHA 214 7.8 Summary 216 7.9 Problems 216 III Topics in Network Security 221 8 Network Security Basics 223 8.1 Introduction 223 8.2 Networking Basics 223 8.2.1 The Protocol Stack 225 8.2.2 Application Layer 226 8.2.3 Transport Layer 228 8.2.4 Network Layer 231 8.2.5 Link Layer 233 8.3 Cross-Site Scripting Attacks 235 8.4 Firewalls 236 8.4.1 Packet Filter 238 8.4.2 Stateful Packet Filter 240 8.4.3 Application Proxy 240 8.4.4 Defense in Depth 242 8.5 Intrusion Detection Systems 243 8.5.1 Signature-Based IDS 245 8.5.2 Anomaly-Based IDS 246 CONTENTS xi 8.6 Summary 250 8.7 Problems 250 9 Simple Authentication Protocols 257 9.1 Introduction 257 9.2 Simple Security Protocols 259 9.3 Authentication Protocols 261 9.3.1 Authentication Using Symmetric Keys 264 9.3.2 Authentication Using Public Keys 267 9.3.3 Session Keys 268 9.3.4 Perfect Forward Secrecy 270 9.3.5 Mutual Authentication, Session Key, and PFS 273 9.3.6 Timestamps 273 9.4 ``Authentication"" and TCP 275 9.5 Zero Knowledge Proofs 278 9.6 Tips for Analyzing Protocols 282 9.7 Summary 284 9.8 Problems 284 10 Real-World Security Protocols 293 10.1 Introduction 293 10.2 SSH 294 10.2.1 SSH and the Man-in-the-Middle 295 10.3 SSL 296 10.3.1 SSL and the Man-in-the-Middle 299 10.3.2 SSL Connections 300 10.3.3 SSL Versus IPsec 300 10.4 IPsec 301 10.4.1 IKE Phase 1 302 10.4.2 IKE Phase 2 309 10.4.3 IPsec and IP Datagrams 310 10.4.4 Transport and Tunnel Modes 311 10.4.5 ESP and AH 313 10.5 Kerberos 314 10.5.1 Kerberized Login 316 10.5.2 Kerberos Ticket 316 10.5.3 Security of Kerberos 318 10.6 WEP 319 10.6.1 WEP Authentication 319 10.6.2 WEP Encryption 320 10.6.3 WEP Non-Integrity 320 10.6.4 Other WEP Issues 321 10.6.5 WEP: The Bottom Line 322 xii CONTENTS 10.7 GSM 322 10.7.1 GSM Architecture 323 10.7.2 GSM Security Architecture 324 10.7.3 GSM Authentication Protocol 326 10.7.4 GSM Security Flaws 327 10.7.5 GSM Conclusions 329 10.7.6 3GPP 330 10.8 Summary 330 10.9 Problems 331 IV Software 339 11 Software Flaws and Malware 341 11.1 Introduction 341 11.2 Software Flaws 341 11.2.1 Buffer Overflow 345 11.2.2 Incomplete Mediation 356 11.2.3 Race Conditions 356 11.3 Malware 358 11.3.1 Malware Examples 359 11.3.2 Malware Detection 365 11.3.3 The Future of Malware 367 11.3.4 The Future of Malware Detection 369 11.4 Miscellaneous Software-Based Attacks 369 11.4.1 Salami Attacks 369 11.4.2 Linearization Attacks 370 11.4.3 Time Bombs 371 11.4.4 Trusting Software 372 11.5 Summary 373 11.6 Problems 373 12 Insecurity in Software 381 12.1 Introduction 381 12.2 Software Reverse Engineering 382 12.2.1 Reversing Java Bytecode 384 12.2.2 SRE Example 385 12.2.3 Anti-Disassembly Techniques 390 12.2.4 Anti-Debugging Techniques 391 12.2.5 Software Tamper Resistance 392 12.3 Software Development 393 12.3.1 Flaws and Testing 395 12.3.2 Secure Software Development? 396 CONTENTS xiii 12.4 Summary 396 12.5 Problems 397 Appendix 403 A-1 Modular Arithmetic 403 A-2 Permutations 405 A-3 Probability 406 A-4 DES Permutations 406 Index 418

    15 in stock

    £103.46

  • AWS Certified Solutions Architect Associate

    McGraw-Hill Education AWS Certified Solutions Architect Associate

    15 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This up-to-date study guide offers 100% coverage of every objective for the current version of the AWS Certified Solutions Architect Professional examGet complete coverage of all objectives included on the SAA-C02 exam from this comprehensive resource. Written by an expert AWS Solutions Architect and well-respected author, this authoritative guide fully addresses the knowledge and skills required for passing the AWS Certified Solutions Architect â Associate exam. Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Youâll also build your practical knowledge with the many hands-on labs found throughout this guide. Designed to help you pass the exam with ease, this definitive vo

    15 in stock

    £29.99

  • ISE Introduction to Computing Systems From Bits

    McGraw-Hill Education ISE Introduction to Computing Systems From Bits

    15 in stock

    Book SynopsisThe third edition of Introduction to Computing Systems: From bits & gates to C/C++ and beyond is designed to give students a strong foundation of computing early on in their coursework. The book is in two parts: (a) the underlying structure of a computer, and (b) programming in two high-level languages and programming methodology. Taking a bottom-up approach from foundational concepts, such as how a computer operates, to more high-level programming languages enables students to understand each concept while working through the text. This bottom-up approach can lead students to more conceptual understanding and application with less memorizing.Table of Contents1 Welcome Aboard 2 Bits, Data Types, and Operations 3 Digital Logic Structures 4 The von Neumann Model 5 The LC-3 6 Programming 7 Assembly Language 8 Data Structures 9 I/O 10 A Calculator 11 Introduction to C/C++ Programming 12 Variables and Operators 13 Control Structures 14 Functions 15 Testing and Debugging 16 Pointers and Arrays 17 Recursion 18 I/O in C 19 Dynamic Data Structures in C20 Introduction to C++ Appendix A The LC-3 ISA Appendix B From LC-3 to x86 Appendix C The Microarchitecture of the LC-3 Appendix D The C Programming Language Appendix E Useful Tables Appendix F Solutions to Selected Exercises

    15 in stock

    £53.99

  • CTSI Certified Technology SpecialistInstallation

    McGraw-Hill Education CTSI Certified Technology SpecialistInstallation

    15 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The Most Complete, Up-to-Date CTS-I Exam Study System Published with AVIXAâ, CTS -I Certified Technology Specialist-Installation Exam Guide, Second Edition provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisual installation professionals. Each chapter features learning objectives, best practices, diagrams, photos, and chapter review questions with in-depth explanations. Designed to help you prepare for the CTS-I exam, this authoritative resource also serves as an essential on-the-job reference.Online content includes: New CTS-I sample questions from AVIXA Link to a library of installation and AV math videos Link to AVIXA standards CTable of ContentsPART I The CTS-Installation and CTS-I Exam 1 Getting CTS-I Certification 2 The CTS-I Exam PART II The Basics of AV Installation 3 Managing an AV Project 4 Audiovisual Documentation 5 Pre-installation Activities PART III System Fabrication 6 Cable Essentials 7 Mounting AV Equipment 8 Rack Build PART IV AV Installation 9 Audio Systems Installation 10 Video Systems Installation PART V System Setup, Verification, and Closeout 11 Introduction to System Verification 12 Networks 13 Audiovisual Control Systems 14 Audio Gain and System Equalization 15 Video System Setup and Verification 16 Conducting System Closeout 17 Maintain and Repaire Audiovisual Systems PART VI Appendices and Glossary App A Math Formulas Used in AV Installations App B AVIXA Standards App C AVIXA AV Standards Clearinghouse App D Video References

    15 in stock

    £50.99

  • Genesis

    John Murray Press Genesis

    Out of stock

    Book SynopsisTHE FOLLOW UP TO THE INTERNATIONAL BESTSELLER THE AGE OF AI In his final book, the late Henry Kissinger joins forces with two leading technologists to mount a profound exploration of the epochal challenges and opportunities presented by the revolution in Artificial Intelligence.As it absorbs data, gains agency, and intermediates between humans and reality, AI (Artificial Intelligence) will help us to address enormous crises, from climate change to geopolitical conflicts to income inequality. It might well solve some of the greatest mysteries of our universe and elevate the human spirit to unimaginable heights. But it will also pose challenges on a scale and of an intensity that we have never seen - usurping our power of independent judgment and action, testing our relationship with the divine, and perhaps even spurring a new phase in human evolution.The last book of elder statesman Henry Kissinger, written with technologists Craig Mundie and Eric Schmidt, Genesis charts a course between blind faith and unjustified fear as it outlines an effective strategy for navigating the age of AI.

    Out of stock

    £16.14

  • Modern Fortran Explained

    Oxford University Press Modern Fortran Explained

    1 in stock

    Book SynopsisThis new edition of Modern Fortran Explained provides a clear and thorough description of the latest version of Fortran, written by experts in the field with the intention that it remain the main reference work in the field.Table of Contents1: Whence Fortran? 2: Language elements 3: Expressions and assignments 4: Control constructs 5: Program units and procedures 6: Allocation of data 7: Array features 8: Specification statements 9: Intrinsic procedures and modules 10: Data transfer 11: Edit descriptors 12: Operations on external files 13: Further type parameter featur 14: Abstract interfaces and procedure pointers 15: Object-oriented programming 16: Submodules 17: Coarrays 18: Coarray teams 19: Floating-point exception handling 20: Basic interoperability with C 21: Interoperating with C using descriptors 22: Generic programming 23: Other Fortran 2023 enhancements A: Deprecated features B: Obsolescent and deleted features C: Significant examples D: Solutions to exercises

    1 in stock

    £42.75

  • Creo Parametric 9.0 Tutorial

    SDC Publications Creo Parametric 9.0 Tutorial

    1 in stock

    Book SynopsisThe eleven lessons in this tutorial introduce you to the design capabilities of Creo Parametric 9.0. Major topics include part and assembly creation, and creation of engineering drawings. This book has been written specifically with students in mind.

    1 in stock

    £62.70

  • Artificial Intelligence Programming with Python

    John Wiley & Sons Inc Artificial Intelligence Programming with Python

    15 in stock

    Book SynopsisTable of ContentsPreface xxiii Part I Introduction Chapter 1 Introduction to AI 3 1.1 What Is AI? 3 1.2 The History of AI 5 1.3 AI Hypes and AI Winters 9 1.4 The Types of AI 11 1.5 Edge AI and Cloud AI 12 1.6 Key Moments of AI 14 1.7 The State of AI 17 1.8 AI Resources 19 1.9 Summary 21 1.10 Chapter Review Questions 22 Chapter 2 AI Development Tools 23 2.1 AI Hardware Tools 23 2.2 AI Software Tools 24 2.3 Introduction to Python 27 2.4 Python Development Environments 30 2.4 Getting Started with Python 34 2.5 AI Datasets 45 2.6 Python AI Frameworks 47 2.7 Summary 49 2.8 Chapter Review Questions 50 Part II Machine Learning and Deep Learning Chapter 3 Machine Learning 53 3.1 Introduction 53 3.2 Supervised Learning: Classifications 55 Scikit-Learn Datasets 56 Support Vector Machines 56 Naive Bayes 67 Linear Discriminant Analysis 69 Principal Component Analysis 70 Decision Tree 73 Random Forest 76 K-Nearest Neighbors 77 Neural Networks 78 3.3 Supervised Learning: Regressions 80 3.4 Unsupervised Learning 89 K-means Clustering 89 3.5 Semi-supervised Learning 91 3.6 Reinforcement Learning 93 Q-Learning 95 3.7 Ensemble Learning 102 3.8 AutoML 106 3.9 PyCaret 109 3.10 LazyPredict 111 3.11 Summary 115 3.12 Chapter Review Questions 116 Chapter 4 Deep Learning 117 4.1 Introduction 117 4.2 Artificial Neural Networks 120 4.3 Convolutional Neural Networks 125 4.3.1 LeNet, AlexNet, GoogLeNet 129 4.3.2 VGG, ResNet, DenseNet, MobileNet, EffecientNet, and YOLO 140 4.3.3 U-Net 152 4.3.4 AutoEncoder 157 4.3.5 Siamese Neural Networks 161 4.3.6 Capsule Networks 163 4.3.7 CNN Layers Visualization 165 4.4 Recurrent Neural Networks 173 4.4.1 Vanilla RNNs 175 4.4.2 Long-Short Term Memory 176 4.4.3 Natural Language Processing and Python Natural Language Toolkit 183 4.5 Transformers 187 4.5.1 BERT and ALBERT 187 4.5.2 GPT-3 189 4.5.3 Switch Transformers 190 4.6 Graph Neural Networks 191 4.6.1 SuperGLUE 192 4.7 Bayesian Neural Networks 192 4.8 Meta Learning 195 4.9 Summary 197 4.10 Chapter Review Questions 197 Part III AI Applications Chapter 5 Image Classification 201 5.1 Introduction 201 5.2 Classification with Pre-trained Models 203 5.3 Classification with Custom Trained Models: Transfer Learning 209 5.4 Cancer/Disease Detection 227 5.4.1 Skin Cancer Image Classification 227 5.4.2 Retinopathy Classification 229 5.4.3 Chest X-Ray Classification 230 5.4.5 Brain Tumor MRI Image Classification 231 5.4.5 RSNA Intracranial Hemorrhage Detection 231 5.5 Federated Learning for Image Classification 232 5.6 Web-Based Image Classification 233 5.6.1 Streamlit Image File Classification 234 5.6.2 Streamlit Webcam Image Classification 242 5.6.3 Streamlit from GitHub 248 5.6.4 Streamlit Deployment 249 5.7 Image Processing 250 5.7.1 Image Stitching 250 5.7.2 Image Inpainting 253 5.7.3 Image Coloring 255 5.7.4 Image Super Resolution 256 5.7.5 Gabor Filter 257 5.8 Summary 262 5.9 Chapter Review Questions 263 Chapter 6 Face Detection and Face Recognition 265 6.1 Introduction 265 6.2 Face Detection and Face Landmarks 266 6.3 Face Recognition 279 6.3.1 Face Recognition with Face_Recognition 279 6.3.2 Face Recognition with OpenCV 285 6.3.3 GUI-Based Face Recognition System 288 Other GUI Development Libraries 300 6.3.4 Google FaceNet 301 6.4 Age, Gender, and Emotion Detection 301 6.4.1 DeepFace 302 6.4.2 TCS-HumAIn-2019 305 6.5 Face Swap 309 6.5.1 Face_Recognition and OpenCV 310 6.5.2 Simple_Faceswap 315 6.5.3 DeepFaceLab 322 6.6 Face Detection Web Apps 322 6.7 How to Defeat Face Recognition 334 6.8 Summary 335 6.9 Chapter Review Questions 336 Chapter 7 Object Detections and Image Segmentations 337 7.1 Introduction 337 R-CNN Family 338 YOLO 339 SSD 340 7.2 Object Detections with Pretrained Models 341 7.2.1 Object Detection with OpenCV 341 7.2.2 Object Detection with YOLO 346 7.2.3 Object Detection with OpenCV and Deep Learning 351 7.2.4 Object Detection with TensorFlow, ImageAI, Mask RNN, PixelLib, Gluon 354 TensorFlow Object Detection 354 ImageAI Object Detection 355 MaskRCNN Object Detection 357 Gluon Object Detection 363 7.2.5 Object Detection with Colab OpenCV 364 7.3 Object Detections with Custom Trained Models 369 7.3.1 OpenCV 369 Step 1 369 Step 2 369 Step 3 369 Step 4 370 Step 5 371 7.3.2 YOLO 372 Step 1 372 Step 2 372 Step 3 373 Step 4 375 Step 5 375 7.3.3 TensorFlow, Gluon, and ImageAI 376 TensorFlow 376 Gluon 376 ImageAI 376 7.4 Object Tracking 377 7.4.1 Object Size and Distance Detection 377 7.4.2 Object Tracking with OpenCV 382 Single Object Tracking with OpenCV 382 Multiple Object Tracking with OpenCV 384 7.4.2 Object Tracking with YOLOv4 and DeepSORT 386 7.4.3 Object Tracking with Gluon 389 7.5 Image Segmentation 389 7.5.1 Image Semantic Segmentation and Image Instance Segmentation 390 PexelLib 390 Detectron2 394 Gluon CV 394 7.5.2 K-means Clustering Image Segmentation 394 7.5.3 Watershed Image Segmentation 396 7.6 Background Removal 405 7.6.1 Background Removal with OpenCV 405 7.6.2 Background Removal with PaddlePaddle 423 7.6.3 Background Removal with PixelLib 425 7.7 Depth Estimation 426 7.7.1 Depth Estimation from a Single Image 426 7.7.2 Depth Estimation from Stereo Images 428 7.8 Augmented Reality 430 7.9 Summary 431 7.10 Chapter Review Questions 431 Chapter 8 Pose Detection 433 8.1 Introduction 433 8.2 Hand Gesture Detection 434 8.2.1 OpenCV 434 8.2.2 TensorFlow.js 452 8.3 Sign Language Detection 453 8.4 Body Pose Detection 454 8.4.1 OpenPose 454 8.4.2 OpenCV 455 8.4.3 Gluon 455 8.4.4 PoseNet 456 8.4.5 ML5JS 457 8.4.6 MediaPipe 459 8.5 Human Activity Recognition 461 ActionAI 461 Gluon Action Detection 461 Accelerometer Data HAR 461 8.6 Summary 464 8.7 Chapter Review Questions 464 Chapter 9 GAN and Neural-Style Transfer 465 9.1 Introduction 465 9.2 Generative Adversarial Network 466 9.2.1 CycleGAN 467 9.2.2 StyleGAN 469 9.2.3 Pix2Pix 474 9.2.4 PULSE 475 9.2.5 Image Super-Resolution 475 9.2.6 2D to 3D 478 9.3 Neural-Style Transfer 479 9.4 Adversarial Machine Learning 484 9.5 Music Generation 486 9.6 Summary 489 9.7 Chapter Review Questions 489 Chapter 10 Natural Language Processing 491 10.1 Introduction 491 10.1.1 Natural Language Toolkit 492 10.1.2 spaCy 493 10.1.3 Gensim 493 10.1.4 TextBlob 494 10.2 Text Summarization 494 10.3 Text Sentiment Analysis 508 10.4 Text/Poem Generation 510 10.5.1 Text to Speech 515 10.5.2 Speech to Text 517 10.6 Machine Translation 522 10.7 Optical Character Recognition 523 10.8 QR Code 524 10.9 PDF and DOCX Files 527 10.10 Chatbots and Question Answering 530 10.10.1 ChatterBot 530 10.10.2 Transformers 532 10.10.3 J.A.R.V.I.S. 534 10.10.4 Chatbot Resources and Examples 540 10.11 Summary 541 10.12 Chapter Review Questions 542 Chapter 11 Data Analysis 543 11.1 Introduction 543 11.2 Regression 544 11.2.1 Linear Regression 545 11.2.2 Support Vector Regression 547 11.2.3 Partial Least Squares Regression 554 11.3 Time-Series Analysis 563 11.3.1 Stock Price Data 563 11.3.2 Stock Price Prediction 565 Streamlit Stock Price Web App 569 11.3.4 Seasonal Trend Analysis 573 11.3.5 Sound Analysis 576 11.4 Predictive Maintenance Analysis 580 11.5 Anomaly Detection and Fraud Detection 584 11.5.1 Numenta Anomaly Detection 584 11.5.2 Textile Defect Detection 584 11.5.3 Healthcare Fraud Detection 584 11.5.4 Santander Customer Transaction Prediction 584 11.6 COVID-19 Data Visualization and Analysis 585 11.7 KerasClassifier and KerasRegressor 588 11.7.1 KerasClassifier 589 11.7.2 KerasRegressor 593 11.8 SQL and NoSQL Databases 599 11.9 Immutable Database 608 11.9.1 Immudb 608 11.9.2 Amazon Quantum Ledger Database 609 11.10 Summary 610 11.11 Chapter Review Questions 610 Chapter 12 Advanced AI Computing 613 12.1 Introduction 613 12.2 AI with Graphics Processing Unit 614 12.3 AI with Tensor Processing Unit 618 12.4 AI with Intelligence Processing Unit 621 12.5 AI with Cloud Computing 622 12.5.1 Amazon AWS 623 12.5.2 Microsoft Azure 624 12.5.3 Google Cloud Platform 625 12.5.4 Comparison of AWS, Azure, and GCP 625 12.6 Web-Based AI 629 12.6.1 Django 629 12.6.2 Flask 629 12.6.3 Streamlit 634 12.6.4 Other Libraries 634 12.7 Packaging the Code 635 Pyinstaller 635 Nbconvert 635 Py2Exe 636 Py2app 636 Auto-Py-To-Exe 636 cx_Freeze 637 Cython 638 Kubernetes 639 Docker 642 PIP 647 12.8 AI with Edge Computing 647 12.8.1 Google Coral 647 12.8.2 TinyML 648 12.8.3 Raspberry Pi 649 12.9 Create a Mobile AI App 651 12.10 Quantum AI 653 12.11 Summary 657 12.12 Chapter Review Questions 657 Index 659

    15 in stock

    £26.34

  • Genesis

    John Murray Press Genesis

    15 in stock

    Book SynopsisTHE FOLLOW UP TO THE INTERNATIONAL BESTSELLER THE AGE OF AIIn his final book, the late Henry Kissinger joins forces with two leading technologists to mount a profound exploration of the epochal challenges and opportunities presented by the revolution in Artificial Intelligence.As it absorbs data, gains agency, and intermediates between humans and reality, AI (Artificial Intelligence) will help us to address enormous crises, from climate change to geopolitical conflicts to income inequality. It might well solve some of the greatest mysteries of our universe and elevate the human spirit to unimaginable heights. But it will also pose challenges on a scale and of an intensity that we have never seen - usurping our power of independent judgment and action, testing our relationship with the divine, and perhaps even spurring a new phase in human evolution.The last book of elder statesman Henry Kissinger, written with technologists Craig Mundie and Eric Schmidt, Genesis charts a course between blind faith and unjustified fear as it outlines an effective strategy for navigating the age of AI.

    15 in stock

    £10.44

  • Schaums Outlines UML

    McGraw-Hill Education - Europe Schaums Outlines UML

    15 in stock

    Book SynopsisIn the more than seven years since the Object Management Group (OMG) adopted the Unified Modeling Language (UML), UML has established itself as the de facto industry standard for modeling software systemsIn 2001 OMG put together a task force to revise UML Version 1.0. In March of 2003, UML Version 2.0 was finalized and rolled out to the 35 major companies participating in the adoption effort and made available to the public. This book provides a step-by-step guide to the notation and use of UML, one of the most widely used, object-oriented notation systems/programming languages in existence. The outline demonstrates the use of the techniques and notation of UML through case studies in systems analysis, showing the student clearly how UML is used in all kinds of practical situations. This revised edition will discuss the new infrastructure of the latest UML Version 2.0, and will include new examples, review questions, and notations.Table of ContentsChapter 1: Basic Concepts Chapter 2: Mathematical Concepts in Chemistry Chapter 3: Atoms and Atomic Masses Chapter 4: Electronic Configuration of the Atom Chapter 5: Chemical Bonding Chapter 6: Inorganic Nomenclature Chapter 7: Formula Calculations Chapter 8: Chemical Equations Chapter 9: Net Ionic Equations Chapter 10: Stoichiometry Chapter 11: Molarity Chapter 12: Gases Chapter 13: Kinetic Molecular Theory Chapter 14: Oxidation and Reduction Chapter 15: Solutions Chapter 16: Equilibrium Chapter 17: Acid-Base Theory Chapter 18: Organic Chemistry Chapter 19: Nuclear Reactions Appendix: Scientific Calculations, Glossary, Index, Table of the Elements, Conversions, Periodic Table

    15 in stock

    £13.29

  • Transformational Security Awareness

    John Wiley & Sons Inc Transformational Security Awareness

    15 in stock

    Book SynopsisExpert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, Table of ContentsForeword xxi Introduction xxiii I The Case for Transformation 1 1 You Know Why 3 Humans Are the Last Line of Defense 4 Data Breaches Tell the Story 6 Auditors and Regulators Recognize the Need for Security Awareness Training 11 Traditional Security Awareness Program Methods Fall Short of Their Goals 14 Key Takeaways 16 References 17 2 Choosing a Transformational Approach 19 Your “Why” Determines Your “What” 20 Down the Rabbit Hole 21 Outlining the Key Components and Tools of a Transformational Program 24 A Map of What’s to Come 28 Part 1 in a Nutshell 30 Part 2 in a Nutshell 30 Part 3 in a Nutshell 31 Key Takeaways 32 Notes and References 32 II The Tools of Transformation 35 3 Marketing and Communications 101 for Security Awareness Leaders 37 The Communications Conundrum 38 The Marketing Connection 40 Defining Marketing 44 Embedding Your Messages 53 Get the Right Message to the Right Person at the Right Time 70 Campaigns: If You Aren’t Reinforcing, Your Audience Is Forgetting 76 Tracking Results and Measuring Effectiveness 76 Know When to Ask for Help 77 Key Takeaways 78 Notes and References 78 Additional Reading 81 4 Behavior Management 101 for Security Awareness Leaders 83 Your Users Aren’t Stupid, They’re Human 85 Thinking, Fast and Slow 87 System 1 Thinking 88 System 2 Thinking 91 Working with Human Nature Rather Than Against 93 The Nuts and Bolts of Shaping Behavior 96 The Fogg Behavior Model 97 The Problem with Motivation 103 Nudge Them in the Right Direction 103 Frames: Why Context Is Everything 109 Designing and Debugging Behavior 117 Being Intentional with Target Groups 117 Debugging Behaviors 118 Design “Power Prompts” Wherever Possible 122 Password Management Example, Continued 123 Habits Make Hard Things Easier to Do 130 Thinking About Guardrails 132 Tracking Results and Measuring Effectiveness 133 Key Takeaways 134 Notes and References 135 Additional Reading 137 5 Culture Management 101 for Security Awareness Leaders 141 Security Culture is Part of Your Larger Organizational Culture 144 Getting Started 147 Understanding Your Culture’s Status Quo 149 Go Viral: Unleash the Power of Culture Carriers 156 Cultures in (Potential) Conflict: Remember Global and Social Dynamics 164 Cultural Forces 165 Structures 167 Pressures 167 Rewards 169 Rituals 169 Tracking Results and Measuring Effectiveness 171 Key Takeaways 171 Notes and References 172 Additional Reading 174 6 What’s in a Modern Security Awareness Leader’s Toolbox? 175 Content Is King: Videos, Learning Modules, and More 176 Big Box Shopping: A Content Analogy 178 Types of Content 181 Experiences: Events, Meetings, and Simulations 186 Meetings, Presentations, and Lunch-and-Learns 187 Tabletop Exercises 188 Rituals 189 Webinars 190 Games 190 Simulated Phishing and Social Engineering 191 Other Simulations and Embodied Learning 192 Interactions with Other Technologies 193 Relationships: Bringing Context to Content and Experiences 194 Be Intentional and Opportunistic, Always 195 Stories and Analogies 195 Tapping into Cultural Trends 195 Opportunistic Campaigns Based on New Organizational Initiatives and Current Events 196 The Critical “At Home” Connection 197 Use Your Metrics and Anecdotes to Help Tell and Reinforce Your Story 197 Key Takeaways 198 Notes and References 198 7 Voices of Transformation: Interviews with Security Awareness Vendors 201 Anna Collard, Popcorn Training 201 Chris Hadnagy, Social Engineer 204 Drew Rose, Living Security 209 Gary Berman, The CyberHero Adventures: Defenders of the Digital Universe 211 Jason Hoenich, Habitu8 214 Jim Shields, Twist and Shout 217 Kai Roar, CLTRe 219 Lisa Plaggemier, InfoSec Institute 221 Masha Sedova, Elevate Security 224 Stu Sjouwerman, KnowBe4 226 Tom Pendergast, MediaPRO 228 Winn Schwartau, The Security Awareness Company (SAC) 231 Reference 236 III The Process of Transformation 237 8 Living Your Awareness Program Through the Eyes and Lives of Your Audience 239 A Learner Journey Map: Awareness in the Context of Life 240 Key Takeaways 248 Notes and References 248 9 Putting It All Together 251 Before You Begin 252 The Five Secrets of Security Awareness Success 252 Tips for Gaining Buy-In 259 Leverage Cialdini’s Principles of Persuasion 264 Making Adjustments 269 Thoughts About Crafting Campaigns 269 Thinking Through Target Groups 271 Be Intentional with Recognition and Reward 277 Assembling Your Culture Carriers 277 Measuring Your Success 278 What Does the Future Hold? 279 Key Takeaways 280 Notes and References 281 10 Closing Thoughts 283 Leverage the Power of Community. 283 Be a Lifelong Learner 285 Be a Realistic Optimist 290 Conclusion 291 11 Voices of Transformation: Interviews with Security Awareness Program Leaders 293 Bruce Hallas, Marmalade Box 294 Carlos Miró, MUFG Union Bank 296 Dr. Cheryl O. Cooper, Sprint Corporation 298 Krina Snider, Sprint 302 Mark Majewski, Quicken Loans 305 Michael Lattimore, Independent Consultant 307 Mo Amin, Independent Consultant 311 Prudence Smith, Senior Cyber and Information Security Consultant and Industry Speaker 313 Thom Langford, (TL)2 Security 320 Tory Dombrowski, Takeform 323 Appendix: Seven Key Reminder Nudges to Help Your Recall 329 Index 331

    15 in stock

    £20.80

  • Networks

    Oxford University Press Networks

    1 in stock

    Book SynopsisThe study of networks, including computer networks, social networks, and biological networks, has attracted enormous interest in the last few years. The rise of the Internet and the wide availability of inexpensive computers have made it possible to gather and analyze network data on an unprecedented scale, and the development of new theoretical tools has allowed us to extract knowledge from networks of many different kinds. The study of networks is broadly interdisciplinary and central developments have occurred in many fields, including mathematics, physics, computer and information sciences, biology, and the social sciences. This book brings together the most important breakthroughs in each of these fields and presents them in a coherent fashion, highlighting the strong interconnections between work in different areas.Topics covered include the measurement of networks; methods for analyzing network data, including methods developed in physics, statistics, and sociology; fundamentals of graph theory; computer algorithms; mathematical models of networks, including random graph models and generative models; and theories of dynamical processes taking place on networks.Trade ReviewThis is the definitive book on networks, friendly enough for anyone to read and serious enough for researchers to find their way. [Newman] is one of the founders and leaders of the field and has updated the book with cutting-edge topics. * Professor Cris Moore, Santa Fe Institute *This is the definitive book on network science, by one of its most brilliant researchers and graceful expositors. The second edition of Mark Newman's Networks is clear, comprehensive, and fascinating. * Steven Strogatz, Department of Mathematics, Cornell University, USA *This is an excellent textbook by one of the preeminent scholars in the study of networks. I draw heavily from it when teaching my undergraduate course on networks, and I am very pleased to see a new edition of the book. Newman's clear exposition shines through in this textbook. * Mason Porter, Department of Mathematics, UCLA, USA *An extraordinarily comprehensive and clear exposition of network science from one of the giants in the field. Newman succeeds in making accessible to a broad readership even the most technical content. * Santo Fortunato, School of Informatics and Computing, Indiana University *Reviews from previous edition:Networks accomplishes two key goals: It provides a comprehensive introduction and presents the theoretic backbone of network science. [] The book is balanced in its presentation of theoretical concepts, computational techniques, and algorithms. The level of difficulty increases which each chapter [which] makes the book particularly valuable to physics students who wish to acquire a solid foundation based on their knowledge of basic linear algebra, calculus, and differential equations. * Physics Today *Newman has written a wonderful book that gives an extensive overview of the broadly interdisciplinary network-related developments that have occured in many fields, including mathematics, physics, computer science, biology, and the social sciences ... Overall, a valuable resource covering a wide-randing field. * Choice *Likely to become the standard introductory textbook for the study of networks [...] Overall, this is an excellent textbook for the growing field of networks. It is cleverly written and suitable as both an introduction for undergraduate students (particularly Parts 1 to 3) and as a roadmap for graduate students. [...] Being highly self-contained, computer scientists and professionals from other fields can also use the book - in fact, the author himself is a physicist. In short, this book is a delight for the inquisitive mind. * Computing Reviews *This book brings together, for the first time, the most important breakthroughs in each of these fields and presents them in a coherent fashion, highlighting the strong connections between work in different subject areas. * CERN Courier *Table of Contents1: Introduction Part I: The empirical study of networks 2: Technological networks 3: Networks of information 4: Social networks 5: Biological networks Part II: Fundamentals of network theory 6: Mathematics of networks 7: Measures and metrics 8: Computer algorithms 9: Network statistics and measurement error 10: The structure of real-world networks Part III: Network models 11: Random graphs 12: The configuration model 13: Models of network formation Part IV: Applications 14: Community structure 15: Percolation and network resilience 16: Epidemics on networks 17: Dynamical systems on networks 18: Network search

    1 in stock

    £65.55

  • Microsoft Certified Azure Fundamentals AllinOne

    McGraw-Hill Education Microsoft Certified Azure Fundamentals AllinOne

    15 in stock

    Book SynopsisA highly effective, integrated self-study system for the Microsoft Azure Fundamentals exam Prepare for the current version of the Microsoft Azure Fundamentals exam using the detailed information contained in this test preparation guide. Written by a cloud computing expert and experienced author, the book contains accurate practice questions, step-by-step exercises, and special elements that aid in learning and reinforce retention. Microsoft Certified Azure Fundamentals All-in-One Exam Guide (Exam AZ-900) features in-depth coverage of every topic on the challenging exam. You will explore core Azure services, security, compliance, and trust. Fulfilling the promise of the All-in-One series, the guide serves as both a test preparation tool and an on-the-job reference for risk and compliance professionals.â100% coverage of all objectives for the Microsoft Azure Fundamentals exam âContains hands-on exercises aTable of ContentsIntroductionChapter 1 Cloud Computing Concepts An Introduction to Cloud Computing Reasons to Consider Cloud Computing Cloud Computing Deployment Options Cloud Service Models Technical Benefits of Cloud Computing Chapter ReviewChapter 2 Azure Concepts and Architecture Components Azure Portal The Azure Architecture Framework Azure Subscriptions Resources and Azure Resource Groups Azure Regions Azure Regional Pairs Availability Zones and Management Groups Azure Resource Manager (ARM) Chapter ReviewChapter 3 Azure Resources An Introduction to Compute Resources Azure Virtual Machines Azure App Service Azure Container Instances Azure Kubernetes Service Windows Virtual Desktop An Introduction to Storage Resources An Introduction to Database Resources An Introduction to Networking Resources Azure Marketplace Chapter ReviewChapter 4 Management Tools and Solutions Azure Management Tools Azure IoT Solutions Overview Data Analytics Solutions Artificial Intelligence and Machine Learning Solutions Serverless Computing DevOps Solutions Chapter ReviewChapter 5 General Security and Network Security Core Security Features Azure Key Vault Azure Sentinel Azure Dedicated Hosts Azure Defense Strategies in Depth Chapter ReviewChapter 6 Identity, Governance, Privacy, and Compliance Authentication and Authorization Azure Active Directory Conditional Access, Multi-Factor Authentication (MFA), and Single Sign-On (SSO) Azure Governance Features An Overview of Security, Privacy, and Trust Azure Sovereign Regions Chapter ReviewChapter 7 Cost Management and Service-Level Agreements Planning and Managing Costs Pricing Calculator and Total Cost of Ownership Calculator Azure Cost Management Azure Service-Level Agreement Service Lifecycle in Azure Chapter ReviewAppendix A Objective Map Exam AZ-900Appendix B About the Online Content System Requirements Your Total Seminars Training Hub Account Single User License Terms and Conditions TotalTester Online Technical SupportGlossaryIndex

    15 in stock

    £23.99

  • Computer Science Education

    Bloomsbury Publishing PLC Computer Science Education

    1 in stock

    Book SynopsisDrawing together the most up-to-date research from experts all across the world, the second edition of Computer Science Education offers the most up-to-date coverage available on this developing subject, ideal for building confidence of new pre-service and in-service educators teaching a new discipline. It provides an international overview of key concepts, pedagogical approaches and assessment practices. Highlights of the second edition include:- New sections on machine learning and data-driven (epistemic) programming- A new focus on equity and inclusion in computer science education- Chapters updated throughout, including a revised chapter on relating ethical and societal aspects to knowledge-rich aspects of computer science education- A new set of chapters on the learning of programming, including design, pedagogy and misconceptions- A chapter on the way we use language in the computer science classroom. The book is structured to support the reader with chapterTrade ReviewThis updated edition reflects developments in Computer Science (CS) education in accessible way and with strong emphasis on inclusion and social justice. The authors, leaders in the field, offer an international perspective on theoretical and practical considerations for teaching CS. An important textbook for preservice and inservice CS teachers. -- Yota Dimitriadi * Institute of Education, University of Reading, UK *Curated and crafted by international leaders in computer science (CS) education. They strike a balance between research, practice and thoughtful discussion, presenting evidence-based K-12 CS education in an accessible way. An ideal textbook for any teacher education program or of interest to practising teachers wishing to upskill or refresh in CS education. -- Rebecca Vivian * Research Fellow, Computer Science Education Research Group, The University of Adelaide, Australia *Table of ContentsPreface Foreword to the 2nd edition Acknowledgements Part I: Positioning Computer Science in Schools 1. Introduction to Part 1, Carsten Schulte (University of Paderborn, Germany) 2. The Nature of Computing as a Discipline, Matti Tedre (University of Eastern Finland, Finland) 3. Perspectives on Computing Curricula, Erik Barendsen and Mara Saeli (Radboud University, The Netherlands) 4. Computer Science, Interaction, and the World -The ARIadne Principle, Carsten Schulte, Felix Winkelnkemper and Lea Budde (University of Paderborn, Germany) 5. Computational Thinking: A Competency Whose Time Has Come, Shuchi Grover (SRI International's Center for Technology in Learning, USA) and Roy Pea (Stanford University, USA) 6. Learning Machine Learning in K-12, Ilkka Jormanainen, Matti Tedre, Henriikka Vartiainen, Teemu Valtonen, Tapani Toivonen and Juho Kahila (University of Eastern Finland, Finland) Part II: Computing for All: Equity and Inclusion 7. Introduction to Part 2, Nicol R. Howard 8. Equity and Inclusion in Computer Science Education: Research on Challenges and Opportunities, Jill Denner and Shannon Campe (Education, Training, and Research, USA) 9. Engaging Culturally Relevant and Responsive Pedagogies in Computer Science Classrooms, Tia C. Madkins (The University of Texas at Austin, USA) and Nicol R. Howard (University of Redlands, USA) 10. Increasing access, participation, and inclusion within K-12 CS education through Universal Design for Learning and High Leverage Practices, Maya Israel, Latoya Chandler, Alexis Cobo and Lauren Weisberg (University of Florida, USA) Part III: Teaching and Learning in Computer Science 11. Introduction to Part 3, Erik Barendsen (Radboud University & Open University, The Netherlands) 12. Teaching Computing in Primary Schools, Tim Bell (University of Canterbury, New Zealand) and Caitlin Duncan (Osaka University, Japan) 13. Teaching of Concepts, Paul Curzon, Peter W. McOwan, James Donohue, Seymour Wright and William Marsh (Queen Mary University of London, UK) 14. Language and Computing, Ira Diethelm, Juliana Goschler, Timo Arnken (Carl von Ossietzky Universität - Didaktik der Informatik, Germany) and Sue Sentance (University of Cambridge, UK) 15. Investigating Attitudes towards Learning Computer Science, Quintin Cutts and Peter Donaldson (University of Glasgow, UK) 16. Formative assessment in the Computing Classroom, Sue Sentance (University of Cambridge, UK) and Shuchi Grover (SRI International's Center for Technology in Learning, USA) Part IV: A Focus on Programming 17. Introduction to Part 4, Sue Sentance (University of Cambridge, UK) 18. Principles of Programming Education, Michael E. Caspersen (It-vest - networking universities, Denmark) 19. The Role of Design in Primary (K-5) Programming, Jane Waite (Raspberry Pi Foundation, UK) 20. Misconceptions and the Beginner Programmer, Juha Sorva (Aalto University, Finland) 21. Programming in the Classroom, Sue Sentance (University of Cambridge, UK) and Jane Waite (Raspberry Pi Foundation, UK) 22. Epistemic Programming, Sven Hüsing, Carsten Schulte and Felix Winkelnkemper (University of Padeborn, Germany) Glossary Index

    1 in stock

    £25.64

  • Technology for Success

    Cengage Learning, Inc Technology for Success

    5 in stock

    Book Synopsis

    5 in stock

    £42.99

  • 50 Codes that Changed the World

    Headline Publishing Group 50 Codes that Changed the World

    5 in stock

    Book SynopsisA CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLDFrom the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy.In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations.<Trade ReviewThis book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. * The Guardian *[Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. * The Express *Disturbing and compelling in equal measure. Sinclair McKay brings a dark subject vividly to life in [The Fire and the Darkness]. * Keith Lowe, author of Savage Continent and The Fear and the Freedom *Engrossing . . . well-researched, powerfully written, and balanced. For all interested in military history and World War II. * Library Journal *Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it. * Daily Mail *Powerful . . . there is rage in his ink. McKay's book [Dresden] grips by its passion and originality. Some 25,000 people perished in the firestorm that raged through the city. I have never seen it better described' -- Max Hastings * Sunday Times *

    5 in stock

    £10.44

  • CCSK Certificate of Cloud Security Knowledge

    McGraw-Hill Education CCSK Certificate of Cloud Security Knowledge

    15 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This effective study guide provides 100% coverage of every topic on the challenging CCSK exam from the Cloud Security AllianceThis highly effective self-study guide covers all domains of the challenging Certificate of Cloud Security Knowledge v4 exam. Written by a cloud security trainer and consultant in collaboration with the Cloud Security Alliance, CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide offers clear explanations, real-world examples, and practice questions that match the content and format of those on the actual exam. To aid in retention, each chapter includes exam tips that highlight key information, a review that serves as a quick recap of salient points, and practice questions tTable of ContentsChapter 1: Cloud Computing Concepts and ArchitecturesChapter 2: Governance and Enterprise Risk ManagementChapter 3: Legal Issues, Contracts, and Electronic DiscoveryChapter 4: Compliance and Audit ManagementChapter 5: Information GovernanceChapter 6: Management Plan E and Business ContinuityChapter 7: Infrastructure SecurityChapter 8: Virtualization and ContainersChapter 9: Incident ResponseChapter 10: Application SecurityChapter 11: Data Security and EncryptionChapter 12: Identity, Entitlement, and Access ManagementChapter 13: Security as a ServiceChapter 14: Related TechnologiesChapter 15: ENISA Cloud Computing: Benefits, Risks and Recommendations for Information SecurityAppendix A: Cloud Security LexiconAppendix B: Cloud Security Standards and CertificationsAppendix C: Sample Cloud Policy

    15 in stock

    £29.24

  • Creating Value with Data Analytics in Marketing

    Taylor & Francis Ltd Creating Value with Data Analytics in Marketing

    1 in stock

    Book SynopsisThis book is a refreshingly practical yet theoretically sound roadmap to leveraging data analytics and data science. The vast amount of data generated about us and our world is useless without plans and strategies that are designed to cope with its size and complexity, and which enable organizations to leverage the information to create value in marketing.Creating Value with Data Analytics in Marketing provides a nuanced view of big data developments and data science, arguing that big data is not a revolution but an evolution of the increasing availability of data that has been observed in recent times. Building on the authors' extensive academic and practical knowledge, this book aims to provide managers and analysts with strategic directions and practical analytical solutions on how to create value from existing and new big data. The second edition of this bestselling text has been fully updated in line with developments in the field and includes a selection of new, Trade Review"More than ever before, managers are held accountable for the return on their marketing investments. Data science has thus become a centerpiece in the skills arsenal of today’s manager. This comprehensive, yet eminently readable book is a must read for anyone seriously interested in using data science to create firm value."Jan-Benedict Steenkamp, C. Knox Massey Distinguished Professor of Marketing, University of North Carolina at Chapel Hill, USA"Data science and big data analytics are in vogue these days but none of the current books on these subjects combine an understanding of them along with how they interface with marketing metrics. This is precisely what Peter Verhoef, Edwin Kooge, Natasha Walk and Jaap Wieringa have accomplished! The book is literally a treasure trove for marketing practitioners, academics and students, to not only understand the specifics of the data science techniques and methodologies but also to develop an appreciation of how they can all be put together to inform managers and drive decision making!"P.K. Kannan, Associate Dean of Strategic Initiatives at University of Maryland, Robert H. Smith School of Business, USA"In the age of big data, understanding data analytic in marketing is crucial. This edition highlights how data can bring value to the organization and brand while addressing the need for customer privacy and data security. This book helps the reader understand the what story the data is saying as well as create a data-driven culture. A must read for anyone wanting a better understanding of how data can bring value in marketing."Joyce Costello, Marketing Management, Cardiff Metropolitan University, UK"This superb book brilliantly synthesizes knowledge that every researcher and professional working with marketing analytics should have. The new edition of this much-valued book is even better!"Polymeros Chrysochou, Professor at Department of Management & MAPP Centre, Aarhus University, Denmark"This book offers an amazing overview of what data analytics entails, and how any marketer can create value through (big) data. It offers many great examples and is written in a no nonsense manner combining the best of academic and practitioner knowledge. If you are serious about data analytics, this book is a must-read."Arne De Keyser, Associate Professor of Marketing, EDHEC Business School, France"This revised edition is a practical book introducing readers to big data analytics in marketing in details. It is packed with great examples and engaging case studies. The book is well structured and is easy to understand. A great book for students, scholars and practitioners to start their journey in exploring big data analytics in marketing."Mingming Cheng, Senior Lecturer in Digital Marketing, School of Management and Marketing, Curtin University, AustraliaTable of Contents1 Data science and big data; 2 Creating value with data science; 3 Value objectives and metrics; 4 Data assets; 5 Data storing and integration; 6 Customer privacy and data security; 7 Data analytics; 8 Data exploration; 9 Data modeling; 10 Creating impact with storytelling and visualization; 11 Creating value with data science; 12 Building successful data analytics capabilities

    1 in stock

    £43.69

  • But How Do It Know

    John C. Scott But How Do It Know

    15 in stock

    15 in stock

    £12.95

  • The Art of Game Design

    Taylor & Francis Ltd The Art of Game Design

    2 in stock

    Book SynopsisThe Art of Game Design guides you through the design process step-by-step, helping you to develop new and innovative games that will be played again and again. It explains the fundamental principles of game design and demonstrates how tactics used in classic board, card and athletic games also work in top-quality video games.Good game design happens when you view your game from as many perspectives as possible, and award-winning author Jesse Schell presents over 100 sets of questions to ask yourself as you build, play and change your game until you finalise your design.This latest third edition includes examples from new VR and AR platforms as well as from modern games such as Uncharted 4 and The Last of Us, Free to Play games, hybrid games, transformational games, and more.Whatever your role in video game development an understanding of the principles of game design will make you better at what you do. For over 10 years this book has provided iTable of ContentsCh 1 In the Beginning, There Is the Designer. Ch 2 The Designer Creates an Experience. Ch 3 The Experience Takes Place in a Venue. Ch 4 The Experience Rises Out of a Game. Ch 5 The Game Consists of Elements. Ch 6 Ch 7 The Elements Support a Theme. Ch 8 The Game Begins with an Idea. Ch 9 The Game Improves through Iteration. Ch 10 The Game Is Made for a Player. Ch 11 The Experience Is in the Player’s Mind. Ch 12 The Player’s Mind Is Driven by the Player’s Motivation. Ch 13 Some Elements Are Game Mechanics. Ch 14 Game Mechanics Must Be in Balance. Ch 15 Game Mechanics Support Puzzles. Ch 16 Players Play Games through an Interface. Ch 17 Experiences Can Be Judged by Their Interest Curves. Ch 18 One Kind of Experience Is the Story. Ch 19 Story and Game Structures Can Be Artfully Merged with Indirect Control. Ch 20 Stories and Games Take Place in Worlds. Ch 21 Worlds Contain Characters. Ch 22 Worlds Contain Spaces. Ch 23 The Look and Feel of a World Is Defined by Its Aesthetics. Ch 24 Some Games Are Played with Other Players. Ch 25 Other Players Sometimes Form Communities. Ch 26 The Designer Usually Works with a Team. Ch 27 The Team Sometimes Communicates through Documents. Ch 28 Good Games Are Created through Playtesting. Ch 29 The Team Builds a Game with Technology. Ch 30 Your Game Will Probably Have a Client. Ch 31 The Designer Gives the Client a Pitch. Ch 32 The Designer and Client Want the Game to Make a Profit. Games Ch 33 Transform Their Players. Designers Have Certain Responsibilities. Ch 34 Each Designer Has a Purpose.

    2 in stock

    £52.24

  • The Supermen

    John Wiley & Sons Inc The Supermen

    15 in stock

    Book SynopsisThe SUPERMEN "After a rare speech at the National Center for Atmospheric Research in Boulder, Colorado, in 1976, programmers in the audience had suddenly fallen silent when Cray offered to answer questions. He stood there for several minutes, waiting for their queries, but none came.Table of ContentsThe Codebreakers. The Incubator. Seymour. Engineers' Paradise. The Hog Trough. The CRAY-1. The Cray Way. The New Genius. Shakeout. Notes. Acknowledgments. Index.

    15 in stock

    £25.60

  • Business Intelligence For Dummies

    John Wiley & Sons Inc Business Intelligence For Dummies

    15 in stock

    Book SynopsisUnderstand the principles and practical elements of BI Choose the right technology and implement a successful BI environment You're intelligent, right? So you've already figured out that Business Intelligence can be pretty valuable in making the right decisions about your business.Table of ContentsIntroduction. Part I: Introduction and Basics. Chapter 1: Understanding Business Intelligence. Chapter 2: Fitting BI with Other Technology Disciplines. Chapter 3: Meeting the BI Challenge. Part II: Business Intelligence User Models. Chapter 4: Basic Reporting and Querying. Chapter 5: OLAP: Online Analytical Processing. Chapter 6: Dashboards and Briefing Books. Chapter 7: Advanced / Emerging BI Technologies. Part III: The BI Lifecycle. Chapter 8: The BI Big Picture. Chapter 9: Human Factors in BI Implementations. Chapter 10: Taking a Closer Look at BI Strategy. Chapter 11: Building a Solid BI Architecture and Roadmap. Part IV: Implementing BI. Chapter 12: Building the BI Project Plan. Chapter 13: Collecting User Requirements. Chapter 14: BI Design and Development. Chapter 15: The Day After: Maintenance and Enhancement. Part V: BI and Technology. Chapter 16: BI Target Databases: Data Warehouses, Marts, and Stores. Chapter 17: BI Products and Vendors. Part VI: The Part of Tens. Chapter 18: Ten Keys to BI Success. Chapter 19: Ten BI Risks (and How to Overcome Them). Chapter 20: Ten Keys to Gathering Good BI Requirements. Chapter 21: Ten Secrets to a Successful BI Deployment. Chapter 22: Ten Secrets to a Healthy BI Environment. Chapter 23: Ten Signs That Your BI Environment Is at Risk. Index.

    15 in stock

    £20.79

  • Genesis

    John Murray Press Genesis

    Out of stock

    Book SynopsisTHE FOLLOW UP TO THE INTERNATIONAL BESTSELLER THE AGE OF AI Artificial Intelligence is raising urgent questions about the future of humanity - whose contours and consequences are revealed by three eminent thinkers in Genesis. AI will help us to address enormous crises, from climate change to geopolitical conflicts to income inequality. It might well solve some of the greatest mysteries of our universe, revolutionize fields as diverse as medicine and architecture, and elevate the human spirit to unimaginable heights. But it will also pose challenges on a scale and of an intensity that we have never seen - usurping our power of independent judgment and action, testing our relationship with the divine, and perhaps even spurring a new phase in human evolution. Whom will we choose to lead our species through this wilderness? Or have we, passively and unwittingly, already chosen? The last book of elder sta

    Out of stock

    £20.00

  • ObjectOriented Systems Analysis and Design Using

    McGraw-Hill Education - Europe ObjectOriented Systems Analysis and Design Using

    Out of stock

    Book SynopsisThe fourth edition of Object- Oriented Systems Analysis and Design has been revised and updated to reflect the most up-to-date approaches to information systems development. Still a best-seller in its field, Bennettâs, McRobbâs and Farmerâs text remains a key teaching resource for Systems Analysis and Design courses at both undergraduate and postgraduate level. The book provides a clear, practical framework for development that uses all the major techniques from UML 2.2. It follows an iterative and incremental approach based on the industry-standard Unified Process, placing systems analysis and design in the context of the whole systems lifestyle. Structured in four parts, the first provides the background to information systems analysis and design and to object-orientation. The second part focuses on the activities of requirements gathering and systems analysis, as well as the basic notation of UML. Part three covers the activities of systems architecture and design, and UML nTable of ContentsA1 Agate Ltd Case Study—IntroductionB1 FoodCo Ltd Case Study—Introduction 1 Information Systems—What Are They? 2 Challenges in Information Systems Development 3 Meeting the Challenges 4 What is Object-Orientation? 5 Modelling Concepts 6 Requirements Capture A2 Agate Ltd Case Study—Requirements Model 7 Requirement Analysis A3 Agate Ltd Case Study—Requirements Analysis 8 Refining the Requirements Model 9 Object Interaction 10 Specifying Operations 11 Specifying Control A4 Agate Ltd Case Study—Further Analysis 12 Moving into Design 13 Systems Design and Architecture 14 Detailed Design 15 Design Patterns 16 Human–Computer Interaction 17 Designing Boundary Classes 18 Data Management Design A5 Agate Ltd Case Study—Design 19 Implementation 20 Software Reuse 21 Software Development Processes

    Out of stock

    £56.99

  • Metadata

    MIT Press Metadata

    1 in stock

    Book Synopsis

    1 in stock

    £15.29

  • Autodesk Maya 2025 Basics Guide

    SDC Publications Autodesk Maya 2025 Basics Guide

    Out of stock

    Book Synopsis

    Out of stock

    £71.24

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account