Contents: PART ONE The need for access control systems Chapter 1 Access control framework Chapter 2 Assessing risk and its impact on access control Chapter 3 Business drivers for access controls Chapter 4 Access control policies, standards, procedures, and guidelines Chapter 5 Security Breaches and the law PART TWO Mitigating risk with access control systems, authentication, and…
Contents: PART ONE Introduction to wireless and mobile networks Chapter 1 The evolution of data networks Chapter 2 The evolution of wired networking to wireless networking Chapter 3 The mobile revolution Chapter 4 Security threats overview: wired, wireless, and mobile PART TWO WLAN security Chapter 5 How do WLANs work Chapter 6 WLAN and IP networking threat and vulnerability a…
Contents: 1 ARM cortex-4M development systems 1.1 Introduction 2 Analog input and output 2.1 Introduction 2.2 TLV320AIC3104 (AIC3104)stereo codec for audio input and output 2.3 WM5102 audio hub codec for audio input and output 2.4 Programming examples 2.5 Real-time input output using polling, interrupts, and direct memory access (DMA) 2.6 Real-time waveform generation 2.7 Identif…
Table of contents: PART I Electromagnetic Field Theory 1 1 Basic Electromagnetic Theory 3 1.1 Review of Vector Analysis, 3 1.2 Maxwell’s Equations in Terms of Total Charges and Currents, 11 1.3 Constitutive Relations, 18 1.4 Maxwell’s Equations in Terms of Free Charges and Currents, 25 1.5 Boundary Conditions, 27 1.6 Energy, Power, and Poynting’s Theorem, 31 1.7 Time-Harmonic Fie…
Table of contents: ch. 1 Semiconductor Diodes ch. 2 Diode Applications ch. 3 Bipolar Junction Transistors ch. 4 DC Biasing-BJTs ch. 5 BJT AC Analysis ch. 6 Field-Effect Transistors ch. 7 FET Biasing ch. 8 FET Amplifiers ch. 9 BJT and JFET Frequency Response ch. 10 Operational Amplifiers ch. 11 Op-Amp Applications ch. 12 Power Amplifiers ch. 13 Linear-Digital ICs ch. 14 Feedback an…
Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …
Table of contents: A. About the Author B. Dedication C. Acknowledgments D. Introduction 1. Introduction What Is the Raspberry Pi? What Can You Do with a Raspberry Pi? A Tour of the Raspberry Pi Setting Up Your Raspberry Pi Booting Up Summary 2. Getting Started Linux The Desktop The Int…
Table of contens: CHAPTER 1. INFORMATION SYSTEMS AND DIGITAL TECHNOLOGY 1 1.1. The concept of information systems 1 1.2. History of the concept of information systems 5 1.2.1. The centralized processing stage (1950s–1960s) 5 1.2.2. The data decentralization stage (1970s–1990s) 6 1.2.3. The interoperability and standardization stage (1990s) 6 1.2.4. The universality and globalization …
Contents : Part I Preliminary considerations Chapter 1. The selection of a research approach The three approaches to research Three components involved in an approach Research approaches as worldviews Design and methods Criteria for selecting a research approach Summary Additional readings Chapter 2. Review of the literature The research topic The literature review Summary Ad…
Contents: Chapter 1 Selecting an Operating System 1 What Is an OS? 1 Investigating User Interfaces 4 Where Does Linux Fit in the OS World? 8 What Is a Distribution? 13 Chapter 2 Understanding Software Licensing 21 Investigating Software Licenses 21 Looking at the Free Software Foundation 24 Looking at the Open Source Initiative 26 Looking at the Creative Commo…