You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers b...
This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytoken
Since it was first recognized as a mineral admixture for concrete in the 1930's, fly ash has been the subject of worldwide study as researchers work to maximize its economical and environmental benefits. In recent years, investigations have focused on the physical, chemical and mineralogical characteristics of fly ash and their specific correlation to the performance of concrete. This book collects the latest results from these various studies and offers a complete review of the advantages of fly ash as an admixture in concrete, including strength development and improved chemical resistance and durability. A review of the current international standards on fly ash usage is provided, in addition to an extensive reference list and a complete survey of various other fly ash products, such as bricks, mineral wool and gypsum wall boards, as well as the use of fly ash in waste management.
This book describes the journey of Singapore ́s development and the fundamental role that water has had in shaping it. What makes this case so unique is that the quest for self-sufficiency in terms of water availability in a fast-changing urban context has been crucial to the way development policies and agendas have been planned throughout the years.
Invasive non-native species are a major threat to global biodiversity. Often introduced accidentally through international travel or trade, they invade and colonize new habitats, often with devastating consequences for the local flora and fauna. Their environmental impacts can range from damage to resource production (e.g. agriculture and forestry) and infrastructure (e.g. buildings, road and water supply), to human health. They consequently can have major economic impacts. It is a priority to prevent their introduction and spread, as well as to control them. Freshwater ecosystems are particularly at risk from invasions and are landscape corridors that facilitate the spread of invasives. Thi...