Amazon Price: N/A (as of March 23, 2017 06:21 –
Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86 assembly language programming and the computational capabilities of the x86 platform. Book appendixes can be downloaded here: http://www.apress.com/9781484200650?gtmf=s
Major topics of the book include the following:
Amazon Price: N/A (as of March 22, 2017 19:21 –
Most people believe that the right to privacy is inherently at odds with the right to free speech. Courts all over the world have struggled with how to reconcile the problems of media gossip with our commitment to free and open public debate for over a century. The rise of the Internet has made this problem more urgent. We live in an age of corporate and government surveillance of our lives. And our free speech culture has created an anything-goes environment on the web, where offensive and hurtful speech about others is rife. How should we think about the problems of privacy and free speech? In Intellectual Privacy, Neil Richards offers a different solution, one that ensures that our ideas and values keep pace with our technologies. Because of the importance of free speech to free and open societies, he argues that when privacy and free speech truly conflict, free speech should almost always win. Only when disclosures of truly horrible information are made (such as sex tapes) should privacy be able to trump our commitment to free expression. But in sharp contrast to conventional wisdom, Richards argues that speech and privacy are only rarely in conflict. Americas obsession with celebrity culture has blinded us to more important aspects of how privacy and speech fit together. Celebrity gossip might be a price we pay for a free press, but the privacy of ordinary people need not be. True invasions of privacy like peeping toms or electronic surveillance will rarely merit protection as free speech. And critically, Richards shows how most of the law we enact to protect online privacy pose no serious burden to public debate, and how protecting the privacy of our data is not censorship. More fundamentally, Richards shows how privacy and free speech are often essential to each other. He explains the importance of intellectual privacy, protection from surveillance or interference when we are engaged in the processes of generating ideas – thinking, reading, and speaking with confidantes before our ideas are ready for public consumption. In our digital age, in which we increasingly communicate, read, and think with the help of technologies that track us, increased protection for intellectual privacy has become an imperative. What we must do, then, is to worry less about barring tabloid gossip, and worry much more about corporate and government surveillance into the minds, conversations, reading habits, and political beliefs of ordinary people. A timely and provocative book on a subject that affects us all, Intellectual Privacy will radically reshape the debate about privacy and free speech in our digital age.
Amazon Price: $85.00 $85.00 (as of March 22, 2017 14:47 –
Actionable guidance and expert perspective for real-world cybersecurity
The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world situations, and cross-functional solutions for enterprise-wide improvement. Beginning with an overview of counter-cyber evolution, the discussion quickly turns practical with design and implementation guidance for the range of capabilities expected of a robust cyber risk management system that is integrated with the enterprise risk management (ERM) system. Expert contributors from around the globe weigh in on specialized topics with tools and techniques to help any type or size of organization create a robust system tailored to its needs. Chapter summaries of required capabilities are aggregated to provide a new cyber risk maturity model used to benchmark capabilities and to road-map gap-improvement.
Amazon Price: N/A (as of September 25, 2016 14:07 –
The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against future cyber attacks? Recent policy documents set out a strategy for securing all of cyberspace, which experts argue is impossible to implement, but also unnecessary. This thesis seeks to move the discussion beyond this stalemate by undertaking an analysis of the vulnerability of cyberspace to terrorist attacks. The first analysis examines the Code Red Worm and the Slammer Worm. These two worms were selected because they were highly destructive and spread faster than normal worms, making them well suited for assessing the existing security of computers and networks. The next analysis examines a staged cyber attack on critical infrastructure, entitled Attack Aurora. In the staged Aurora attack, researchers from the Department of Energy’s Idaho lab hacked into a replica of a power plant’s control system. This attack is the most recent staged attack and facilitates an analysis of vulnerabilities of critical infrastructures to cyberterrorism.