The Disc Shop







The Disc Shop

Computer Talk - Business Computer - Computer Games - Computer Software

Computer Shop - Computer Mice - New Computer - Antivirus Software






Analyzing Computer Security

RRP $261.99

Click on the Google Preview image above to read some pages of this book!

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 


Colorful Owls On A Branch Computer Paper

RRP $9.99

Click on the Google Preview image above to read some pages of this book!

Use this adorable and delightful Colorful Owls on a Branch design to promote your classroom theme! So many uses to liven up projects, writing assignments, class newsletters and more! Add style to personalized awards, letters and lists--the possibilities are endless! Look for coordinating products in this design to create this popular classroom theme! Comes in 50 sheets per pack.


Computer-aided Geometric Design

RRP $519.99

Click on the Google Preview image above to read some pages of this book!

Computer graphics, computer-aided design, and computer-aided manufacturing are tools that have become indispensable to a wide array of activities in contemporary society. Euclidean processing provides the basis for these computer-aided design systems although it contains elements that inevitably lead to an inaccurate, non-robust, and complex system. The primary cause of the deficiencies of Euclidean processing is the division operation, which becomes necessary if an n-space problem is to be processed in n-space. The difficulties that accompany the division operation may be avoided if processing is conducted entirely in (n+1)-space. The paradigm attained through the logical extension of this approach, totally four-dimensional processing, is the subject of this book. This book offers a new system of geometric processing techniques that attain accurate, robust, and compact computations, and allow the construction of a systematically structured CAD system.


The New Poetics Of Climate Change

RRP $313.99

Click on the Google Preview image above to read some pages of this book!

Climate change is the greatest crisis of our time - and yet too often writing on the subject is separated off as 'environmental' writing, divorced from culture, society and politics. The New Poetics of Climate Change argues that the reality of global warming presents us with a fundamental challenge to the way we read and write poetry in the modern age.

In this important new book, Matthew Griffiths demonstrates the ways in which modernism's radical reinvigorations of literary form over the last century represents an engagement with key intellectual questions that we still need to address if we are to comprehend the scale and complexity of climate change. Through an extended examination of modernist poetry, including the work of T. S. Eliot, Wallace Stevens, Basil Bunting and David Jones, and their influence on present-day poets such as Michael Symmons Roberts and Jorie Graham, Griffiths explores how modernist modes help us describe and engage with the terrifying dynamics of a warming world and offer a poetics of our climate.


Computer Vision And Action Recognition

RRP $316.99

Click on the Google Preview image above to read some pages of this book!

Human action analyses and recognition are challenging problems due to large variations in human motion and appearance, camera viewpoint and environment settings. The field of action and activity representation and recognition is relatively old, yet not well-understood by the students and research community. Some important but common motion recognition problems are even now unsolved properly by the computer vision community. However, in the last decade, a number of good approaches are proposed and evaluated subsequently by many researchers. Among those methods, some methods get significant attention from many researchers in the computer vision field due to their better robustness and performance. This book will cover gap of information and materials on comprehensive outlook - through various strategies from the scratch to the state-of-the-art on computer vision regarding action recognition approaches. This book will target the students and researchers who have knowledge on image processing at a basic level and would like to explore more on this area and do research. The step by step methodologies will encourage one to move forward for a comprehensive knowledge on computer vision for recognizing various human actions.



Search

The Disc Shop Articles

Computer Talk Business Computer Computer Games Computer Software
Computer Shop Computer Mice New Computer Antivirus Software
Computer Consulting Home Computer

The Disc Shop Books

Computer Talk Business Computer Computer Games Computer Software
Computer Shop Computer Mice New Computer Antivirus Software
Computer Consulting Home Computer

The Disc Shop