Catalog Search Results
Author
Language
English
Appears on list
Description
"Recruited from small Southern towns and posh New England colleges, 10,000 American women served the U.S. Army and Navy as code breakers during World War II. While their brothers and husbands took up arms, these women moved to Washington and, under strict vows of secrecy, learned the meticulous work of breaking German and Japanese military codes. Poring over reams of encrypted messages, the women worked tirelessly in makeshift facilities in Washington,...
Author
Series
Language
English
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Series
Language
English
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Language
English
Description
Categorical trust in digitality is nirvana for information technology (IT) and operational technology (OT) convergence from device manufacturing to provisioning, commissioning, and field operations in production environments. It may not require expensive hardware upgrades to legacy devices and may be achievable with cost effective software or firmware enhancements, to extend the operational lifetime and efficiency of brownfield and greenfield devices...
Author
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Language
English
Description
In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process...
Author
Language
English
Description
Traces the life of Elizebeth Smith, who met and married groundbreaking cryptologist William Friedman and worked with him to discover and expose Nazi spy rings in South America by cracking multiple versions of the Enigma machine.
"In 1916, a young Quaker schoolteacher and poetry scholar named Elizebeth Smith was hired by an eccentric tycoon to find the secret messages he believed were embedded in Shakespeare's plays. She moved to the tycoon's lavish...
Author
Language
English
Description
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today. Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Language
English
Description
"Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million.” These basic cybersecurity statistics should alarm everyone. With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of cybersecurity professionals. These are the people responsible...
Author
Language
English
Description
A history of cryptology from its early days in Ancient Egypt, Sparta and Rome to the present day when it has ceased to be a government monopoly and now affects all our lives whenever we use our mobile phones or connect to the internet. Subjects covered here include Mary Queen of Scots' cryptic messages when she was plotting against her cousin Elizabeth I; code-breaking during World Wars I and II including the Enigma Machine and the interception of...
14) Breaking the code: a father's secret, a daughter's journey, and the question that changed everything
Author
Publisher
Sourcebooks
Language
English
Formats
Description
Karen Fisher-Alaniz grew up barely listening to her father's stories of his childhood and of his time in the Navy, but on his 81st birthday, her father gave her two notebooks containing more than 400 pages of letters written to his parents during World War II. It was only then that she discovered the man she never knew and his secret role in the war.
Author
Language
English
Appears on list
Description
Joining the elite Bletchley Park codebreaking team during World War II, three women from very different walks of life uncover a spy's dangerous agenda years later against the backdrop of the royal wedding of Elizabeth and Philip.
1940. As England prepares to fight the Nazis, three very different women answer the call to Bletchley Park, where the best minds in Britain train to break German military codes. Osla puts her fluent German to use as a translator...
16) Exploring Blockchain in Healthcare: Implementation and Impact of Distributed Database Across Phar
Author
Language
English
Description
An overview of the Healthcare Industry and Applications of the Blockchain KEY FEATURES ● Includes graphical representations and architecture schematics for healthcare processes powered by the blockchain technology.● Real-world examples of how medical and pharma companies can use a blockchain in healthcare.● Includes algorithms and procedures for smart contracts to provide more in-depth knowledge. DESCRIPTION This book aims to analyze the role...
Author
Series
Language
English
Description
Security Engineering is the third domain of the Certified Information Systems Security Professional certification. In this course we will cover the following: secure design principle and processes, fundamental concepts of security modules, security evaluation models, security capabilities of information systems, vulnerabilities in security architecture and technology components, cryptography and site and secure facility design.
Author
Language
English
Description
Blockchain technology has certainly been hyped over the past few years, but when you strip all of that away, what can actually do with it? This book provides you with an introduction to Ethereum, an open source platform that's based based on blockchain. It enables developers to build and deploy decentralized applications that can be relied on to work without fraud, censorship or interference from third parties. Far more than just a cryptocurrency...
Author
Language
English
Description
Want to grasp the full scope of the NFT landscape and its underlying principles?
If yes, then you should keep reading because you have found the right book.
It's possible to make more money with non-fungible tokens than with other coins or cryptocurrencies, but only if you know what you're doing.
If you have just heard about Non-Fungible Tokens but know nothing about them, this book will teach you all you need to know to make money with them, achieve...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request