This book distils into a single coherent handbook all the essentials of process automation at a depth sufficient for most practical purposes. No other book covers the gap between the theory and practice of control systems so comprehensively.
Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression. This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of ´´how to´´ use them. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and non-specialists.
A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper. Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography.
- This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application - New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking ´´unbreakable´´ software packages such as McAfee´s Entercept, Mac OS X, XP, Office 2003, and Vista - Also features the first-ever published information on exploiting Cisco´s IOS, with content that has never before been explored - The companion Web site features downloadable code files The black hats have kept up with security enhancements. Have you? In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution vulnerabilities still allow attackers to run code of their choice on your system--with disastrous results. In a nutshell, this book is about code and data and what happens when the two become confused. You´ll work with the basic building blocks of security bugs--assembler, source code, the stack, the heap, and so on. You´ll experiment, explore, and understand the systems you´re running--and how to better protect them. * Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco´s IOS * Learn how to write customized tools to protect your systems, not just how to use ready-made ones * Use a working exploit to verify your assessment when auditing a network * Use proof-of-concept exploits to rate the significance of bugs in software you´re developing * Assess the quality of purchased security products by performing penetration tests based on the information in this book * Understand how bugs are found and how exploits work at the lowest level
´´We´re all safer when the systems we depend upon are inspectable, auditable, and documented - and this definitely includes cars.´´ - Chris Evans, hacker and founder of Project Zero Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven´t kept pace with today´s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker´s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle´s communication network, you´ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker´s Handbook will show you how to: - Build an accurate threat model for your vehicle - Reverse engineer the CAN bus to fake engine signals - Exploit vulnerabilities in diagnostic and data-logging systems - Hack the ECU and other firmware and embedded systems - Feed exploits through infotainment and vehicle-to-vehicle communication systems - Override factory settings with performance-tuning techniques - Build physical and virtual test benches to try out exploits safely If you´re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker´s Handbook your first stop.
Now updated in line with the 2011 syllabus, this quick-reference revision guide has been designed to help students prepare for their foundation exam. It is also a key reference aid for managers, practitioners, vendors and consultants in the workplace and while travelling. This handbook provides an introduction to the ITIL service lifecycle model and an overview of the ITIL qualification structure. It contains a chapter on each of the components of the lifecycle: service strategy, service design, service transition, service operation and continual service improvement.
This highly comprehensive handbook provides a substantial advance in the computation of elementary and special functions of mathematics, extending the function coverage of major programming languages well beyond their international standards, including full support for decimal floating-point arithmetic. Written with clarity and focusing on the C language, the work pays extensive attention to little-understood aspects of floating-point and integer arithmetic, and to software portability, as well as to important historical architectures. It extends support to a future 256-bit, floating-point format offering 70 decimal digits of precision. Select Topics and Features: references an exceptionally useful, author-maintained MathCW website, containing source code for the book´s software, compiled libraries for numerous systems, pre-built C compilers, and other related materials; offers a unique approach to covering mathematical-function computation using decimal arithmetic; provides extremely versatile appendices for interfaces to numerous other languages: Ada, C#, C++, Fortran, Java, and Pascal; presupposes only basic familiarity with computer programming in a common language, as well as early level algebra; supplies a library that readily adapts for existing scripting languages, with minimal effort; supports both binary and decimal arithmetic, in up to 10 different floating-point formats; covers a significant portion (with highly accurate implementations) of the U.S National Institute of Standards and Technology´s 10-year project to codify mathematical functions. This highly practical text/reference is an invaluable tool for advanced undergraduates, recording many lessons of the intermingled history of computer hardw are and software, numerical algorithms, and mathematics. In addition, professional numerical analysts and others will find the handbook of real interest and utility because it builds on research by the mathematical software community over the last four decades.