Instant Web Scraping with Java

Rating: 
Amazon Price: N/A (as of September 20, 2017 12:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Java is often thought of as a stuffy enterprise language, while web scraping is the often-murky domain of scripting languages. By combining the robustness and extensibility of Java with the flexibility and power of web scraping, we can create immensely useful tools that can solve very difficult problems.
Continue reading “Instant Web Scraping with Java”

Practical Information Security Management: A Complete Guide to Planning and Implementation

Rating: 
Amazon Price: $49.99 $47.49 You save: $2.50 (5%). (as of September 20, 2017 11:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks.

Practical Information Security Management provides a wealth of practical advice for anyone responsible for information security management in the workplace, focusing on the ‘how’ rather than the ‘what’. Together we’ll cut through the policies, regulations, and standards to expose the real inner workings of what makes a security management program effective, covering the full gamut of subject matter pertaining to security management: organizational structures, security architectures, technical controls, governance frameworks, and operational security.
Continue reading “Practical Information Security Management: A Complete Guide to Planning and Implementation”

Measures of Effectiveness for the Information-Age Navy: The Effects of Network-Centric Operations on Combat Outcome

Measures of Effectiveness for the Information-Age Navy: The Effects of Network-Centric Operations on Combat OutcomeIn military operations, information has always been every bit as vital as fuel or ammunition in achieving favorable outcomes. Today, the need to reduce decision timelines highlights its importance. The Navy postulates that network-centric operations will enhance the effectiveness of combat systems by allowing commanders to mass effects from great distances. At issue is verification of this assumption. How can the effectiveness of network-centric information systems be linked to combat outcomes? The authors seek to identify how information affects outcomes and determine how to measure the link between the two. This report creates a framework for developing measures to help the Navy decide how network-centric operations affect combat outcomes and which information systems work best. The authors demonstrate a proof-of-concept tool that cangenerate several alternative network-centric command, control, communications, computer, intelligence, surveillance, and reconnaissancesystems. Using a spreadsheet model, they take the first steps toward developing formulas to help the Navy codify an approach to measuring combat effectiveness in network-centric operations.

Price: $24.00

Click here to buy from Amazon

The Dark Net: Inside the Digital Underworld

Rating: 
Amazon Price: $27.95 (as of September 20, 2017 14:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

An Independent and New Statesman Book of the Year

Beyond the familiar online world that most of us inhabit—a world of Google, Facebook, and Twitter—lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net.
Continue reading “The Dark Net: Inside the Digital Underworld”

GNS 5890 ADS-B Receiver USB-Stick

Rating: 
Amazon Price: N/A (as of September 20, 2017 04:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Introducing the smallest ADS-B receiver, able to show all airplanes equipped with a ADS-B transponder in a max. 300km radius on the map. Includes ADS-B scope software, USB receiver & antenna. Also works with the popular PlanePlotter software.