Angebote zu "Mobile" (86 Treffer)

Practical Cyber Forensics: An Incident-Based Ap...
27,99 € *
ggf. zzgl. Versand

Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you´ll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following this, you will work with cloud and mobile forensic techniques by considering the concept of forensics as a service (FaSS), giving you cutting-edge skills that will future-proof your career. Building on this, you will learn the process of breaking down malware attacks, web attacks, and email scams with case studies to give you a clearer view of the techniques to be followed. Another tricky technique is SSD forensics, so the author covers this in detail to give you the alternative analysis techniques you´ll need. To keep you up to speed on contemporary forensics, Practical Cyber Forensics includes a chapter on Bitcoin forensics, where key crypto-currency forensic techniques will be shared. Finally, you will see how to prepare accurate investigative reports. What You Will Learn Carry out forensic investigation on Windows, Linux, and macOS systems Detect and counter anti-forensic techniques Deploy network, cloud, and mobile forensics Investigate web and malware attacks Write efficient investigative reports Who This Book Is For Intermediate infosec professionals looking for a practical approach to investigative cyber forensics techniques.

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
Visual Studio Code Distilled
21,99 € *
ggf. zzgl. Versand

Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice. Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development scenarios, including web, mobile, and cloud development. Visual Studio Code Distilled teaches you how to be immediately productive with Visual Studio Code, from the basics to some of the more complex topics. You will learn how to work on individual code files, complete projects, and come away with an understanding of advanced code-editing features that will help you focus on productivity, and source code collaboration with Git. What You´ll Learn Comprehend Visual Studio Code in a way that is not just theory or a list of features, but an approach driven by developer tasks and needs Understand integrated support for team collaboration with Git for executing and debugging code, and the many ways you can extend and customize VS Code Debug code on multiple platforms though real-world guidance, such as working under corporate networks Expand your coding intelligence from web to mobile to the cloud, and even artificial intelligence Acquire valuable tips, tricks, and suggestions from hard-earned, real-world experience to be more productive Who This Book Is For All developers (including JavaScript, Java, NodeJS), not just those with a Microsoft background, who will benefit from learning and using VS code as a cross-platform and cross-language tool.

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
3D User Interfaces
53,99 € *
ggf. zzgl. Versand

From video games to mobile augmented reality, 3D interaction is everywhere. But simply choosing to use 3D input or 3D displays isn´t enough: 3D user interfaces (3D UIs) must be carefully designed for optimal user experience. 3D User Interfaces: Theory and Practice, Second Edition is today´s most comprehensive primary reference to building outstanding 3D UIs. Four pioneers in 3D user interface research and practice have extensively expanded and updated this book, making it today´s definitive source for all things related to state-of-the-art 3D interaction. This edition goes far beyond VR, covering the full spectrum of emerging applications for 3D UIs, and presenting an extraordinary array of pioneering techniques and technologies. The authors combine theoretical foundations, analysis of devices and techniques, empirically validated design guidelines, and much more. Throughout each chapter, they illustrate key concepts with running case studies on gaming, mobile AR, and robot teleoperation.

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
Der IT Security Manager
49,99 € *
ggf. zzgl. Versand

Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden - Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung von Sicherheitszielen und die Erstellung von Leitlinien und Sicherheitskonzepten werden klar und verständlich dargestellt. Anhand vieler praktischer Beispiele erfahren Sie alles über Risikoanalysen und -bewertungen sowie über wichtige Sicherheitsmaßnahmen aus den Bereichen Organisation, Recht, Personal, Infrastruktur und Technik. In der vierten Auflage wurde neben vielen Aktualisierungen und Erweiterungen (z.B. im Hinblick auf den Einsatz mobiler IT-Systeme) das Kapitel über die Inventarisierung komplett überarbeitet; als neues Kapitel wurde die Verhinderung von Datenlecks (Data Loss / Leakage Prevention) in sensiblen Organisationen aufgenommen.

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
IoT Security Issues
26,99 € *
ggf. zzgl. Versand

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
Policy-Based Autonomic Data Governance
47,99 € *
ggf. zzgl. Versand

Advances in artificial intelligence, sensor computing, robotics, and mobile systems are making autonomous systems a reality. At the same time, the influence of edge computing is leading to more distributed architectures incorporating more autonomous elements. The flow of information is critical in such environments, but the real time, distributed nature of the system components complicates the data protection mechanisms. Policy-based management has proven useful in simplifying the complexity of management in domains like networking, security, and storage; it is expected that many of those benefits would carry over to the task of managing big data and autonomous systems. This book aims at providing an overview of recent work and identifying challenges related to the design of policy-based approaches for managing big data and autonomous systems. An important new direction explored in the book is to make the major elements of the system self-describing and self-managing. This would lead to architectures where policy mechanisms are tightly coupled with the system elements. In such integrated architectures, we need new models for information assurance, traceability of information, and better provenance on information flows. In addition when dealing with devices with actuation capabilities and, thus, being able to make changes to physical spaces, safety is critical. With an emphasis on policy-based mechanisms for governance of data security and privacy, and for safety assurance, the papers in this volume follow three broad themes: foundational principles and use-cases for the autonomous generation of policies; safe autonomy; policies and autonomy in federated environments.

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
Power Analysis Attacks
103,99 € *
ggf. zzgl. Versand

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, the authors provide an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles. By analyzing the pros and cons of the different countermeasures, this volume allows practitioners to decide how to protect smart cards. Smart cards are used as ATM cards, credit cards, SIM cards, signature cards, pay TV cards and citizen cards. The security of these cards is of crucial importance. Power Analysis Attacks and Countermeasures for Cryptographic Smart Cards provides a unified overview andcomparison of power analysis attacks and countermeasures to protect this technology. The pros and cons of different countermeasures are analyzed in order to help decide how to protect our card devices against power analysis attacks.Power Analysis Attacks and Countermeasures for Cryptographic Smart Cards is designed for researchers and graduate-level students in computer science. This book is also suitable for practitioners in industry.

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
Designing Interfaces
33,99 € *
ggf. zzgl. Versand

Despite all of the UI toolkits available today, it´s still not easy to design good application interfaces. This bestselling book is one of the few reliable sources to help you navigate through the maze of design options. By capturing UI best practices and reusable ideas as design patterns, Designing Interfaces provides solutions to common design problems that you can tailor to the situation at hand. This updated edition includes patterns for mobile apps and social media, as well as web applications and desktop software. Each pattern contains full-color examples and practical design advice that you can use immediately. Experienced designers can use this guide as a sourcebook of ideas; novices will find a roadmap to the world of interface and interaction design. * Design engaging and usable interfaces with more confidence and less guesswork * Learn design concepts that are often misunderstood, such as affordances, visual hierarchy, navigational distance, and the use of color * Get recommendations for specific UI patterns, including alternatives and warnings on when not to use them * Mix and recombine UI ideas as you see fit * Polish the look and feel of your interfaces with graphic design principles and patterns ´´Anyone who´s serious about designing interfaces should have this book on their shelf for reference. It´s the most comprehensive cross-platform examination of common interface patterns anywhere.´´--Dan Saffer, author of Designing Gestural Interfaces (O´Reilly) and Designing for Interaction (New Riders)

Anbieter: buecher.de
Stand: 13.06.2019
Zum Angebot
Eye Tracking in User Experience Design
38,99 € *
ggf. zzgl. Versand

Eye Tracking for User Experience Design explores the many applications of eye tracking to better understand how users view and interact with technology. Ten leading experts in eye tracking discuss how they have taken advantage of this new technology to understand, design, and evaluate user experience. Real-world stories are included from these experts who have used eye tracking during the design and development of products ranging from information websites to immersive games. They also explore recent advances in the technology which tracks how users interact with mobile devices, large-screen displays and video game consoles. Methods for combining eye tracking with other research techniques for a more holistic understanding of the user experience are discussed. This is an invaluable resource to those who want to learn how eye tracking can be used to better understand and design for their users. Includes highly relevant examples and information for those who perform user research and design interactive experiences Written by numerous experts in user experience and eye tracking. Highly relevant to anyone interested in eye tracking & UX design Features contemporary eye tracking research emphasizing the latest uses of eye tracking technology in the user experience industry.

Anbieter: buecher.de
Stand: 16.06.2019
Zum Angebot