Password KeeperFinally end your lost password frustrations with this pocket-sized password organizer. It’s a sleek and stylish password reminder book that has over 300 spots for logging important information. Whether you need it for work or home, this journal will organize all your logins, passwords, hints, security questions and more. There's even additional log space for important internet and network information to keep handy. Grab this simple but extremely useful password keeper and add it to your cart today! Over 100 pages Over 300 Logs spots Measures 5"x 8"
Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline.
The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology.
Continue reading “Topics in Parallel and Distributed Computing: Introducing Concurrency in Undergraduate Courses”
Written by a stellar team of experts, Analyzing Social Networks is a practical book on how to collect, visualize, analyze and interpret social network data with a particular emphasis on the use of the software tools UCINET and Netdraw.
The book includes a clear and detailed introduction to the fundamental concepts of network analyses, including centrality, subgroups, equivalence and network structure, as well as cross-cutting chapters that helpfully show how to apply network concepts to different kinds of networks.
Continue reading “Analyzing Social Networks”
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.
The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization.
Continue reading “Cyberpower and National Security (National Defense University)”
Harden the human firewall against the most current threats
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.
Continue reading “Social Engineering: The Science of Human Hacking”