Social Network Analysis

Rating: 
Amazon Price: N/A (as of February 1, 2018 04:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Third Edition of this best-selling text has been fully revised and updated to include coverage of the many developments on social network analysis (SNA) over the last decade. Written in a clear and accessible style, the book introduces these topics to newcomers and non-specialists and gives sufficient detail for more advanced users of social network analysis. Throughout the book, key ideas are discussed in relation to the principal software programs available for SNA.

The book provides a comprehensive overview of the field, outlining both its theoretical basis and its key techniques. Drawing from the core ideas of points, lines and paths, John Scott builds a framework of network analysis that covers such measures as density, centrality, clustering, centralisation, and spatialisation. He identifies the various types of clique, component, and circle into which networks are formed, and he outlines an approach to socially structured positions within networks. A completely new chapter in this edition discusses recent work on network dynamics and methods for studying change over time. A final chapter discusses approaches to network visualisation.
Continue reading “Social Network Analysis”

The Crowdfunding Revolution: How to Raise Venture Capital Using Social Media

Rating: 
Amazon Price: $35.00 $6.93 You save: $28.07 (80%). (as of September 20, 2018 23:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

THE GROUNDBREAKING NEW METHOD FOR RAISING VENTURE CAPITAL THROUGH SOCIAL NETWORKS

“The declaration of independence for our industry!”
―MAT DELLORSO, WealthForge Inc.
Continue reading “The Crowdfunding Revolution: How to Raise Venture Capital Using Social Media”

Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)

Rating: 
Amazon Price: $39.99 (as of September 20, 2018 14:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

You already know the endless list of security "do's and don'ts": run AV software and firewalls, lock everything down, encrypt everything, watch all your network traffic, follow checklists… But even if you're spending a fortune doing all that, you're at greater risk than ever: even the world's most security-focused organizations are being victimized by massive attacks. Something is terribly wrong. We're protecting the wrong things, damaging productivity, and making it way too hard for our people to help us.

Today, getting security right requires more than checklists; it requires careful thinking about your actual threats and technologies. That's what this book is about: how to think about security. Most security books just give you "do's and don'ts." Thinking Security tells you why, and helps you design a security architecture that truly fits your organization.
Continue reading “Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)”

2013 U.S. Intelligence Community Worldwide Threat Assessment – Cyber Threat to Critical Infrastructure, Iran, Nuclear Weapons, Terrorism, al-Qaida, Jihad, WMD, North Korea, Syria, Afghanistan

Amazon Price: N/A (as of September 20, 2018 03:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Director of National Intelligence James R. Clapper Jr. presented the 2013 annual U.S. intelligence community worldwide threat assessment in Congressional testimony on March 12th. In the published report, Clapper provides a thorough review of the status of possible threats from a wide variety of nations and terror groups. The report highlighted cyber and computer threats to the Nation, stating:

We are in a major transformation because our critical infrastructures, economy, personal lives, and even basic understanding of—and interaction with—the world are becoming more intertwined with digital technologies and the Internet. In some cases, the world is applying digital technologies faster than our ability to understand the security implications and mitigate potential risks. State and nonstate actors increasingly exploit the Internet to achieve strategic objectives, while many governments—shaken by the role the Internet has played in political instability and regime change—seek to increase their control over content in cyberspace. The growing use of cyber capabilities to achieve strategic goals is also outpacing the development of a shared understanding of norms of behavior, increasing the chances for miscalculations and misunderstandings that could lead to unintended escalation.
Continue reading “2013 U.S. Intelligence Community Worldwide Threat Assessment – Cyber Threat to Critical Infrastructure, Iran, Nuclear Weapons, Terrorism, al-Qaida, Jihad, WMD, North Korea, Syria, Afghanistan”

Building Internet Firewalls: Internet and Web Security

Rating: 
Amazon Price: $59.99 $36.75 You save: $23.24 (39%). (as of September 20, 2018 10:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks–and the need to protect both business and personal data–have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Continue reading “Building Internet Firewalls: Internet and Web Security”