Mobile Computer Technicians

Computer Repair - Microsoft - DIY Computer - Build Computer

Repair Computer - Computer Memory - Fix Computer - Computer Virus






Analyzing Computer Security

RRP $261.99

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 


Three-dimensional Computer Vision

RRP $456.99

This monograph by one of the world's leading vision researchers provides a thorough, mathematically rigorous exposition of a broad and vital area in computer vision: the problems and techniques related to three-dimensional (stereo) vision and motion. The emphasis is on using geometry to solve problems in stereo and motion, with examples from navigation and object recognition. Faugeras takes up such important problems in computer vision as projective geometry, camera calibration, edge detection, stereo vision (with many examples on real images), different kinds of representations and transformations (especially 3-D rotations), uncertainty and methods of addressing it, and object representation and recognition. His theoretical account is illustrated with the results of actual working programs. "Three-Dimensional Computer Vision "proposes solutions to problems arising from a specific robotics scenario in which a system must perceive and act. Moving about an unknown environment, the system has to avoid static and mobile obstacles, build models of objects and places in order to be able to recognize and locate them, and characterize its own motion and that of moving objects, by providing descriptions of the corresponding three-dimensional motions. The ideas generated, however, can be used indifferent settings, resulting in a general book on computer vision that reveals the fascinating relationship of three-dimensional geometry and the imaging process. Olivier Faugeras is Research Director of the Computer Vision and Robotics Laboratory at INRIA Sophia-Antipolis and a Professor of Applied Mathematics at the Ecole Polytechnique in Paris.


Start Your Own Computer Business

RRP $75.00

From buying and selling PC hardware to product development and selling services, "Start Your Own Computer Business: The Unembellished Guide" offers a realistic picture of making it on your own. Bestselling author, Morris Rosenthal, has 15 years of experience in the computer business, building and repairing thousands of PCs and helping hundreds of customers. The book mixes practical advice and cautions with real-world anecdotes of successes and failures. Dollars and cents play a prominent role in the book, as Rosenthal stresses that the real challenge of succeeding in the computer business is the business part of the equation. Managing employees, inventory and scarce financial resources are covered, along with how to remain sane and when to quit. The book is illustrated with a series of original cartoons on the computer business subject.


Building The Perfect Daddy/ A Wedding Worth Waiting For

RRP $14.99

Building The Perfect Daddy — Brenda Harlen

On site for his home improvement show ‘America’s Hottest Handyman’, Ryder Wallace is busy with the station’s contest winner. Single mum, Lauryn Schulte, has a dilapidated house and two kids under four — the kind of woman this playboy avoids…but not this time. Not when her little girl has him playing tea party and cuddling her baby brother. And Lauryn?

She torments his libido in ways that should be outlawed. Ryder doesn’t do relationships with strings…but Lauryn has him tied, he should cut and run. So why is he getting tangled in the idea of being a husband and a daddy?

A Wedding Worth Waiting For — Katie Meyer

Devoted to protecting animals, Samantha Finley saves the innocent. Her weak spot? Opening herself up to people in her hometown of Paradise. But the new director of a local animal rescue, Dylan Turner, changes her. Something about him makes her trust in happy-endings, but Sam knows there’s no sense in trusting a heartbreaker...

Dylan agrees eagerly when Sam proposes to a relationship of convenience so she can re-enter Paradise society. But the more he falls for her, the more Dylan knows he must tame the wild woman he’s come to adore — for good! If he has his way, their next date will be at the altar…



About the Authors

Brenda is a former attorney who once had the privilege of appearing before the Supreme Court of Canada. Five years ago she gave up the practice of law to be a stay-at-home mum and to secretly pursue her dreams of writing a book. She enrolled in a romance writing course at a local community college and finished her first book before the course ended.

Three years, five manuscripts and another baby later, Brenda decided to enter the Romance Writers of America's Golden Heart contest and ended up selling her manuscript to one of the final-round judges from Silhouette books.

She loves being part of the Harlequin/Silhouette family and — despite the incessant interruptions of her real-life hero/husband, two heroes-in-training and two neurotic dogs — she looks forward to a long future writing "happily ever after" romances.

Katie Meyer is a Florida native with a firm belief in happy endings. She studied English and Religion before getting a degree in Veterinary Technology. A former Veterinary Technician and dog trainer, she now spends her days homeschooling her children, writing, and snuggling with her many pets. Her guilty pleasures include chocolate, Downton Abbey, and cheap champagne. Credit for her romance writing goes to her parents and her husband, who taught her what true love really is.


Computer Simulation In Financial Risk Management

RRP $256.99

Computer programs that simulate complex processes in the real world can provide a quantitative tool for determining how much debt can be added safely to a company's capital structure. The increasing number of bankruptcies and defaults in today's international business arena result from debt overload and point to major shortcomings in the conventional financial evaluation process. In this book, Roy L. Nersesian describes why current methods of risk management fail and how computer simulation can be employed to determine the safe level of debt more accurately. Because the decision to add debt to an organization requires favorable, and essentially independent, decisions from both the borrower and lender, it is necessary to quantify both perspectives. Through actual examples readers will learn how to do this and to translate an actual business situation into a simulation model or program. Current evaluation systems, according to Nersesian, fail to incorporate the cyclical nature of business activity. They result all too often in an overly optimistic projection of cash flow. Simulation techniques are better able to incorporate the transience of good times and put quantitative analysis of risk on par with quantitative analysis of reward. Simulation techniques also reduce the role of speculative, and highly subjective, judgment. For example, decisionmakers who are not familiar personally with a particular business area, assign more risk to that area than those who are. A quantified risk management system enables executives to rank projects by the degree of risk much as they currently rank them by degree of profitability. The book presents the concept of simulation in terms that can be understood by generalists in corporations and financial institutions. At the same time, it provides computer programmers with an understanding of risk management principles. It will provide a valuable resource for: financial executives, planners and strategists in corporate and governmental organizations; bank lending officers; and computer programmers working with these organizations.



Search

Mobile Computer Technicians Articles

Computer Repair Microsoft DIY Computer Build Computer
Repair Computer Computer Memory Fix Computer Computer Virus

Mobile Computer Technicians Books

Computer Repair Microsoft DIY Computer Build Computer
Repair Computer Computer Memory Fix Computer Computer Virus

Mobile Computer Technicians