Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops

Rating: 
Amazon Price: $44.99 $39.99 You save: $5.00 (11%). (as of June 24, 2018 21:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters.

The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations.
Continue reading “Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops”

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Rating: 
Amazon Price: $50.00 $25.49 You save: $24.51 (49%). (as of June 25, 2018 00:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master the tactics and tools of the advanced persistent threat hacker
In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike Learn the APT Hacker Methodology–a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads

Calculated Extortion: The Calculated Series: Book 0

Rating: 
Amazon Price: N/A (as of June 24, 2018 21:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Before Scarlett helped Mike, Parker, and Alexis solve the cases in Calculated Deception and Calculated Contagion, she was a brand-new profiler at the FBI’s Chicago field office. When a high-profile charity is targeted by a cybercriminal, Scarlett is charged with leading a team of special agents to find the individual hiding behind the malicious code.

Mike Moretti is a FBI special agent accustomed to difficult cases. However, to find out who is bleeding the charity of funds, he’ll need to team up with the new profiler…even after he mistakes her for the office intern. As the cyberattacks become increasingly personal, Scarlett and her team must find the criminal hiding where the FBI least expects them.
Continue reading “Calculated Extortion: The Calculated Series: Book 0”

A History of Cyber Security Attacks: 1980 to Present

Amazon Price: $49.95 $47.22 You save: $2.73 (5%). (as of June 25, 2018 16:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a "lessons learned and recommendations" section.