You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, sy...
Rex, a husband and father, makes an unintentional error. Will Rex get away with his terrible, taboo-busting mistake? This opening premise is the starting gun to a rollicking ride through London of the late 1980s and early 1990s, in a literary novel that focuses on human frailty, love, marriage, family bonds, gay sex, betrayal, alcoholism, illness and death. Although aspects of the novel are richly ironic and even comedic, it also deals with challenging themes, not least HIV/AIDS. Matt Bishop wrote The Boy Made the Difference because very few (if any) literary novels are set against the narrative backdrop of the HIV/AIDS crisis of the late 1980s and early 1990s, which had a profound and lasting impact on the gay community. All of the proceeds from the book sales will be donated to his late mother’s charity – the Bernardine Bishop Appeal (part of CLIC Sargent – a charity that helps children, young people and their families who are suffering the effects of cancer).
Introduction to Computer Security draws upon Bishop's widely praised Computer Security: Art and Science, without the highly complex and mathematical coverage that most undergraduate students would find difficult or unnecessary. The result: the field's most concise, accessible, and useful introduction. Matt Bishop thoroughly introduces fundamental techniques and principles for modeling and analyzing security. Readers learn how to express security requirements, translate requirements into policies, implement mechanisms that enforce policy, and ensure that policies are effective. Along the way, the author explains how failures may be exploited by attackers--and how attacks may be discovered, understood, and countered. Supplements available including slides and solutions.
With his signature Texas flag painted on his helmet, Johnny "J.R." Rutherford captured the hearts of racing fans all over the world during his stellar three-decade-long career. A versatile driver, he is world renowned for his record-breaking successes in the ultra-competitive world of Indy and Sprint cars. In Lone Star J.R., Johnny himself takes us on an exciting drive through his life and gives us a behind-the-scenes look at the racing world. Born in Coffeyville, Kansas in 1938, John Sherman Rutherford III did his duty in the U.S. Marine Corps for six years before beginning his legendary racing career in Texas. After overcoming a serious accident in 1966, in which he suffered two broken arms, he began to achieve his greatest success. J.R. relives his historic Indianapolis 500 wins (in 1974, 1976, and 1980) and explains the allure and excitement of racing in this personal look back at his storied racing career.
For philanthropists of the past, charity was often a matter of simply giving money away. For the philanthrocapitalists-the new generation of billionaires who are reshaping the way they give-it's like business. Largely trained in the corporate world, these "social investors" are using big-business-style strategies and expecting results and accountability to match. Bill Gates, the world's richest man, is leading the way: he has promised his entire fortune to finding a cure for the diseases that kill millions of children in the poorest countries in the world. In Philanthrocapitalism, Matthew Bishop and Michael Green examine this new movement and its implications. Proceeding from interviews with some of the most powerful people on the planet-including Gates, Bill Clinton, Warren Buffett, Oprah Winfrey, and Bono, among others-they show how a web of wealthy, motivated donors has set out to change the world.
This fast-paced, often-humorous travel book tells the truly ridiculous story of how two British friends, Matt Bishop and Reece Gilkes, became the first people to circumnavigate the globe on a scooter with a sidecar. Their world-record-breaking 34,000-mile-long journey took them through thirty-five countries and across five continents. With no experience of mechanics, overlanding, or even riding motorbikes, the pair took their Honda scooter and barn-built sidecar through some of the world's toughest environments, including a scorching Sahara Desert and the frozen wilds of a Siberian winter.This heartwarming story will restore your faith in humanity as strangers all over the world save the pai...
In April of 2003, the residents of Spring Valley, Nebraska were stunned and shocked when a young student from their local high school, reported as missing, was found brutally raped and murdered. Shortly after the residents, of the tight knit community, had come together to mourn the loss of the beautiful child, they were hit with more shocking and devastating news! Two more students, reported as missing, were also found brutally raped and murdered. For awhile, after the murders, the streets of Spring Valley remained desolate and quiet. However, people too soon forget...and it wasn't long before the young teenagers of, Spring Valley and the surrounding areas, were, once again, walking the streets alone after dark.
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I’ll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.