This book makes powerful Field Programmable Gate Array (FPGA) and reconfigurable technology accessible to software engineers by covering different state-of-the-art high-level synthesis approaches (e.g., OpenCL and several C-to-gates compilers). It introduces FPGA technology, its programming model, and how various applications can be implemented on FPGAs without going through low-level hardware …
Stress management A wellness approach present practical tools for managing stress in six dimensions: physical, emotional, intellectual, social, spiritual, and environmental. Stress is an unavoidable part of our everyday lives—and some of it can be good. But a lot of stress is unhealthy, and most of us don’t know how to handle it. Ignoring or mishandling unhealthy stress has all sorts of ne…
Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…
Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a s…
Virtual, hands-on learning labs allow you to apply your technical skills using live hardware and software hosted in the cloud. So Sybex has bundled CompTIA Linux+ labs from Practice Labs, the IT Competency Hub, with our popular CompTIA Linux+ Study Guide, Fourth Edition. Working in these labs gives you the same experience you need to prepare for the CompTIA Linux+ Exam XK0-004 that you would fa…
Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the…
Termasuk bibliografi dan indeks. CONTENTS: 1. Risk 2. Vulnerability and Threat Identification 3. Risk Measurement 4. Quantifying and Prioritizing Loss Potential 5. Cost/Benefit Analysis 6. Other Risk Analysis Methodologies 7. The Security Survey 8. Management Audit Techniques and the Preliminary Survey 9. The Survey Report 10. Crime…
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new …
Indonesia Penggunaan QR Code saat ini semakin marak karena fungsi QR Code untuk information storage, web links, traceability, identification, dan authentication dalam berbagai bidang kehidupan sehari-hari seperti bidang ekonomi, kesehatan, dan ekspedisi barang. Penggunaan QR Code dalam menyimpan informasi khususnya informasi rahasia membuat QR Code rentan untuk dieksploitasi. Eksploitasi QR C…