Browse Results

Showing 34,051 through 34,075 of 53,723 results

Progress in Artificial Intelligence and Pattern Recognition: 8th International Congress on Artificial Intelligence and Pattern Recognition, IWAIPR 2023, Varadero, Cuba, September 27–29, 2023, Proceedings (Lecture Notes in Computer Science #14335)

by Yanio Hernández Heredia Vladimir Milián Núñez José Ruiz Shulcloper

This book constitutes the refereed proceedings of the 8th International Workshop on Artificial Intelligence and Pattern Recognition, IWAIPR 2023, held in Varadero, Cuba, in October 2023. The 68 papers presented in the proceedings set were carefully reviewed and selected from 38 submissions. The IWAIPR conference aims to provide a leading international forum to promote and disseminate ongoing research into mathematical methods of computing techniques for Artifical Intelligence and Pattern Recognition.

The Common Lisp Condition System: Beyond Exception Handling with Control Flow Mechanisms

by Michał "phoe" Herda

Discover the functioning and example uses of the Common Lisp condition system. This book supplements already existing material for studying Common Lisp as a language by providing detailed information about the Lisp condition system and its control flow mechanisms; it also describes an example ANSI-conformant implementation of the condition system. In part 1 of The Common Lisp Condition System, the author introduces the condition system using a bottom-up approach, constructing it piece by piece. He uses a storytelling approach to convey the foundation of the condition system, dynamically providing code to alter the behavior of an existing program. Later, in part 2, you’ll implement a full and complete ANSI-conformant condition system while examining and testing each piece of code that you write. Throughout, the author demonstrates how to extend Lisp using Lisp itself by using the condition system as an example. This is done while paying proper attention to the CL restart subsystem, giving it attention on a par with the handler subsystem. After reading and using this book, you'll have learned about the inner functioning of the condition system, how to use it in your own Common Lisp coding and applications, and how to implement it from scratch, should such a need arise. What You Will LearnExamine the condition system and see why it is important in Common LispConstruct the condition system from scratch using foundational mechanisms provided by Common LispProgram the condition system and its control flow mechanisms to achieve practical resultsImplement all parts of a condition system: conditions, restarts, handler- and restart-binding macros, signalling mechanisms, assertions, a debugger, and more Who This Book Is For Beginning and intermediate Lisp programmers, as well as intermediate programmers of other programming languages.

Communication Protocols: Principles, Methods and Specifications

by Drago Hercog

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. The book is relevant to researchers, academics, professionals and students in communications engineering.Provides comprehensive yet granular coverage of the protocols of communication systems Allows readers the ability to understand the formal specification of communication protocolsSpecifies communication methods and protocols in the specification language SDL, giving readers practical tools to venture on their own

Maya Programming with Python Cookbook

by Adrian Herbez

Master complex workflows and conquer the world with Python and Maya About This Book * Improve your modelling skills and reduce your scripting problems using Python in Maya * Learn to communicate with web applications using Python for easier team development * A quick and practical answer to every problem you can have whilst scripting in Maya with Python Who This Book Is For This book is for Python developers who have just started scripting with Maya. What You Will Learn * Find out how to use Python scripting to automate tedious tasks * Create functional user interfaces to make scripts easy to share with others * Add new functionality to Maya via the power of scripting * Import and export arbitrary data into and out of Maya * Improve your workflow, and that of your team * Create custom create custom controls to make rigs that are easy to work with * Implement a system to render 3D assets for isometric games * Use script jobs to trigger actions automatically in response to user interaction * Open a command port to allow other applications to communicate with Maya In Detail Maya is a 3D graphics and animation software, used to develop interactive 3D applications and games with stupendous visual effects. The Maya Programming with Python Cookbook is all about creating fast, powerful automation systems with minimum coding using Maya Python. With the help of insightful and essential recipes, this book will help you improve your modelling skills. Expand your development options and overcome scripting problems encountered whilst developing code in Maya. Right from the beginning, get solutions to complex development concerns faced when implementing as parts of build. Style and approach This book is comprised of a set of practical recipes, grouped under specific topics, which can be referred to independently or in sequence. These recipes provide quick solutions to common problems, and cover most of the real-world scenarios that developers are likely to face when working with Maya.

Joomla! 1.5 SEO

by Herbert-Jan van Dinther

This is a practical, hands-on book that will lead you through the process of search engine optimization of your Joomla!-based web site. It provides clear instructions and detailed screenshots, so you can see exactly what to do at each step in the SEO process. Once you have finished reading the book and gone through the detailed plans from each chapter, you will have the knowledge to improve the rankings and visitor numbers of almost any Joomla!-based web site. This book is written for anyone using Joomla! ranging from owners of business sites to web site developers and personal web site owners. Any Joomla! web site owner who wants to sell products or services, or send out a message to the world will find that getting better rankings in the search engines will help them reach their goal. Some prior knowledge of Joomla! is expected but no prior knowledge of search engine optimization is needed for this book. The reader will get a deeper level of knowledge on how to make their web site rank better and attract more visitors to their site.

iFM 2023: 18th International Conference, iFM 2023, Leiden, The Netherlands, November 13–15, 2023, Proceedings (Lecture Notes in Computer Science #14300)

by Paula Herber Anton Wijs

This volume LNCS 14300 constitutes the refereed proceedings of the 18th International Conference, IFM 2023, in November 2023, held in Leiden, The Netherlands. The 16 full papers presented together with 2 short papers were carefully reviewed and selected from 51 submissions. The conference focuses on all aspects of the design of integrated techniques, including language design, verification and validation, automated tool support, and the use of such techniques in software engineering practice.

Advanced Information Systems Engineering: CAiSE Forum 2020, Grenoble, France, June 8–12, 2020, Proceedings (Lecture Notes in Business Information Processing #386)

by Nicolas Herbaut Marcello La Rosa

This book constitutes the thoroughly refereed proceedings of the CAiSE Forum 2020 which was held as part of the 32nd International Conference on Advanced Information Systems Engineering, CAiSE 2020, in June 2020. The conference was held virtually due to the COVID-19 pandemic. The CAiSE Forum is a place within the CAiSE conference for presenting and discussing new ideas and tools related to information systems engineering. Intended to serve as an interactive platform, the Forum aims at the presentation of emerging new topics and controversial positions, as well as demonstration of innovative systems, tools and applications. This year’s theme was “Responsible Information Systems”. The 12 full papers presented in this volume were carefully reviewed and selected from 19 submissions.

Recent Advances on Soft Computing and Data Mining: The Second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016 Proceedings (Advances in Intelligent Systems and Computing #549)

by Tutut Herawan Rozaida Ghazali Nazri Mohd Nawi Mustafa Mat Deris

This book provides a comprehensive introduction and practical look at the concepts and techniques readers need to get the most out of their data in real-world, large-scale data mining projects. It also guides readers through the data-analytic thinking necessary for extracting useful knowledge and business value from the data.The book is based on the Soft Computing and Data Mining (SCDM-16) conference, which was held in Bandung, Indonesia on August 18th–20th 2016 to discuss the state of the art in soft computing techniques, and offer participants sufficient knowledge to tackle a wide range of complex systems. The scope of the conference is reflected in the book, which presents a balance of soft computing techniques and data mining approaches. The two constituents are introduced to the reader systematically and brought together using different combinations of applications and practices. It offers engineers, data analysts, practitioners, scientists and managers the insights into the concepts, tools and techniques employed, and as such enables them to better understand the design choice and options of soft computing techniques and data mining approaches that are necessary to thrive in this data-driven ecosystem.

Advances on Computational Intelligence in Energy: The Applications of Nature-Inspired Metaheuristic Algorithms in Energy (Green Energy and Technology)

by Tutut Herawan Haruna Chiroma Jemal H. Abawajy

Addressing the applications of computational intelligence algorithms in energy, this book presents a systematic procedure that illustrates the practical steps required for applying bio-inspired, meta-heuristic algorithms in energy, such as the prediction of oil consumption and other energy products. Contributions include research findings, projects, surveying work and industrial experiences that describe significant advances in the applications of computational intelligence algorithms in energy. For easy understanding, the text provides practical simulation results, convergence and learning curves as well as illustrations and tables. Providing a valuable resource for undergraduate and postgraduate students alike, it is also intended for researchers in the fields of computational intelligence and energy.

Fault-Tolerance Techniques for High-Performance Computing

by Thomas Herault Yves Robert

This timely text presents a comprehensive overview of fault tolerance techniques for high-performance computing (HPC). The text opens with a detailed introduction to the concepts of checkpoint protocols and scheduling algorithms, prediction, replication, silent error detection and correction, together with some application-specific techniques such as ABFT. Emphasis is placed on analytical performance models. This is then followed by a review of general-purpose techniques, including several checkpoint and rollback recovery protocols. Relevant execution scenarios are also evaluated and compared through quantitative models. Features: provides a survey of resilience methods and performance models; examines the various sources for errors and faults in large-scale systems; reviews the spectrum of techniques that can be applied to design a fault-tolerant MPI; investigates different approaches to replication; discusses the challenge of energy consumption of fault-tolerance methods in extreme-scale systems.

Azure Cloud Security for Absolute Beginners: Enabling Cloud Infrastructure Security with Multi-Level Security Options

by Pushpa Herath

Implement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure. Author Pushpa Herath begins by teaching you the fundamentals of Azure security. An easy to follow exploration of management groups, subscriptions, management locks and Azure policies further elaborate the concepts underlying Azure cloud security. Next, you will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configurations and Azure Defender for Azure storage are discussed, as are key platform security factors. Network security groups, gateways, load balancers, virtual networks and firewall configurations are all demonstrated in detail. Finally, you’ll learn how to create a much more secure environment through Azure App Service Environment in the context of securing infrastructure. If you want to learn the basics of securing Azure, Azure Cloud Security for Absolute Beginners is for you. After reading the book, you will be able to begin implementing secure cloud solutions with Microsoft Azure. What Will You Learn Get up and running quickly securing AzureMaster the basic language of Azure securityUnderstand the security features available in Azure cloudConfigure and maintain Azure cloud security featuresSecure Azure PaaS ServicesLearn identity and access management options in Azure Cloud Who Is This Book For Cloud engineers, DevOps engineers, software developers and architects who are asked to manage or are involved in the Azure infrastructure management but have not had all that much experience with security.

Foundations of Robotics: A Multidisciplinary Approach with Python and ROS

by Damith Herath David St-Onge

This open access book introduces key concepts in robotics in an easy to understand language using an engaging project-based approach. It covers contemporary topics in robotics, providing an accessible entry point to fundamentals in all the major domains. A section is dedicated to introducing programming concepts using Python, which has become a language of choice in robotics and AI. The book also introduces the reader to the Robot Operating System (ROS), the ubiquitous software and algorithmic framework used by researchers and the industry. The book provides an inspired, up-to-date and multidisciplinary introduction to robotics in its many forms, including emerging topics related to robotics on Machine Learning, ethics, Human-Robot Interaction, and Design Thinking. The book also includes interviews with industry experts, providing an additional layer of insight into the world of robotics. The book is made open access through the generous support from Kinova Robotics. The book is suitable as an undergraduate textbook in a relevant engineering course. It is also suitable for students in art and design, high school students, and self-learners who would like to explore foundational concepts in robotics. “This book provides the ‘foundation’ for understanding how robots work. It is the accessible introduction that artists and engineers have been waiting for.” - Ken Goldberg, William S. Floyd Jr. Distinguished Chair in Engineering, UC Berkeley.

Robots and Art

by Damith Herath Christian Kroos Stelarc

The first compendium on robotic art of its kind, this book explores theintegration of robots into human society and our attitudes, fears and hopes ina world shared with autonomous machines. It raises questions about thebenefits, risks and ethics of the transformative changes to society that are the consequence of robotstaking on new roles alongside humans. It takes the reader on a journey into the world of the strange,the beautiful, the uncanny and the daring - and into the minds and works ofsome of the world's most prolific creators of robotic art. Offering anin-depth look at robotic art from the viewpoints of artists, engineers andscientists, it presentsoutstanding works of contemporary robotic art and brings together for the first time some of themost influential artists in this area in the last three decades. Starting froma historical review, this transdisciplinary work explores the nexus betweenrobotic research and the arts andexamines the diversityof robotic art, the encounter with robotic otherness, machine embodiment andhuman-robot interaction. Stories of difficulties, pitfalls and successes arerecalled, characterising the multifaceted collaborations across the diversedisciplines required to create robotic art. Although the book isprimarily targeted towards researchers, artists and students in robotics,computer science and the arts,its accessible style appeals to anyone intrigued by robots and the arts.

Asia Pacific Advanced Network: 56th International Conference, APANConf 2023, Colombo, Sri Lanka, August 24–25, 2023, Revised Selected Papers (Communications in Computer and Information Science #1995)

by Damayanthi Herath Susumu Date Upul Jayasinghe Vijaykrishnan Narayanan Roshan Ragel Jilong Wang

This book constitutes the refereed proceedings of the 56th International Conference onAsia Pacific Advanced Network, APANConf 2023, held in, Colombo, Sri Lanka,during August 24–25, 2023.The 10 full papers and 1 short papers included in this book were carefully reviewed andselected from 37 submissions. They are organized in topical sections as follows: artificial intelligence and machine learning, accelerated computing and distributed systems and communications and networking.

Euro-Par 2017: Euro-par 2017 International Workshops, Santiago De Compostela, Spain, August 28-29, 2017, Revised Selected Papers (Lecture Notes in Computer Science #10659)

by Dora B. Heras Luc Bougé

This book constitutes the proceedings of the workshops of the 23rd International Conference on Parallel and Distributed Computing, Euro-Par 2017, held in Santiago de Compostela. Spain in August 2017. The 59 full papers presented were carefully reviewed and selected from 119 submissions.Euro-Par is an annual, international conference in Europe, covering all aspects of parallel and distributed processing. These range from theory to practice, from small to the largest parallel and distributed systems and infrastructures, from fundamental computational problems to full-edged applications, from architecture, compiler, language and interface design and implementation to tools, support infrastructures, and application performance aspects.

Women in Game Development: Breaking the Glass Level-Cap

by Jennifer Brandes Hepler

Videogame development is usually seen as a male dominated field; even playing videogames is often wrongly viewed as a pastime for men only. But behind the curtain, women have always played myriad important roles in gaming. From programmers to artists, designers to producers, female videogame developers endure not only the pressures of their jobs but also epic levels of harassment and hostility. Jennifer Brandes Hepler’s Women in Game Development: Breaking the Glass Level-Cap gives voice to talented and experienced female game developers from a variety of backgrounds, letting them share the passion that drives them to keep making games. Key Features Experience the unique stories of nearly two dozen female game developers, from old-school veterans to rising stars. Understand the role of women in videogames, from the earliest days of development to the present day. Hear first-hand perspectives from working professionals in fields including coding, design, art, writing, community management, production and journalism. Get tips for how to be a better ally and make your company and teams more inclusive. Learn about the obstacles you face if you’re an aspiring female developer, and how to overcome them. Meet the human face of some of the women who have endured the industry’s worst harassment… and kept on going.

DevOps with OpenShift: Cloud Deployments Made Easy

by Mike Hepburn Noel O'Connor Stefano Picozzi

For many organizations, a big part of DevOps’ appeal is software automation using infrastructure-as-code techniques. This book presents developers, architects, and infra-ops engineers with a more practical option. You’ll learn how a container-centric approach from OpenShift, Red Hat’s cloud-based PaaS, can help your team deliver quality software through a self-service view of IT infrastructure.Three OpenShift experts at Red Hat explain how to configure Docker application containers and the Kubernetes cluster manager with OpenShift’s developer- and operational-centric tools. Discover how this infrastructure-agnostic container management platform can help companies navigate the murky area where infrastructure-as-code ends and application automation begins.Get an application-centric view of automation—and understand why it’s importantLearn patterns and practical examples for managing continuous deployments such as rolling, A/B, blue-green, and canaryImplement continuous integration pipelines with OpenShift’s Jenkins capabilityExplore mechanisms for separating and managing configuration from static runtime softwareLearn how to use and customize OpenShift’s source-to-image capabilityDelve into management and operational considerations when working with OpenShift-based application workloadsInstall a self-contained local version of the OpenShift environment on your computer

Process-Driven SOA: Patterns for Aligning Business and IT

by Carsten Hentrich Uwe Zdun

Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrates the design process using proven patterns that address complex business/technical scenarios, where integrated concepts of service-oriented architecture (SOA), Business Process Management (BPM), and Event-Driven Architecture (EDA) are required. The book demonstrates that SOA is not limited to technical issues but instead, is a holistic challenge where aspects of SOA, EDA, and BPM must be addressed together. An ideal guide for SOA solution architects, designers, developers, managers, and students about to enter the field, the book: Provides an accessible introduction to basic and more advanced concepts in process-driven SOA Illustrates how to manage the complexities of business aligned IT architectures with detailed examples and industry cases Outlines a step-by-step design process using proven patterns to address complex business/ technical scenarios Integrates SOA, BPM, and EDA into practical patterns promoting SOA 2.0 Describing how to synchronize parallel enterprise processes, the authors explain how to cope with the architectural and design decisions you are likely to encounter when designing and implementing process-driven SOA systems. The decisions are described in the form of software patterns to provide you with a practical guideline for addressing key problems using time-tested solutions.

Hybrid Optimization: The Ten Years of CPAIOR (Springer Optimization and Its Applications #45)

by Pascal Van Hentenryck Michela Milano

Hybrid Optimization focuses on the application of artificial intelligence and operations research techniques to constraint programming for solving combinatorial optimization problems. This book covers the most relevant topics investigated in the last ten years by leading experts in the field, and speculates about future directions for research. This book includes contributions by experts from different but related areas of research including constraint programming, decision theory, operations research, SAT, artificial intelligence, as well as others. These diverse perspectives are actively combined and contrasted in order to evaluate their relative advantages. This volume presents techniques for hybrid modeling, integrated solving strategies including global constraints, decomposition techniques, use of relaxations, and search strategies including tree search local search and metaheuristics. Various applications of the techniques presented as well as supplementary computational tools are also discussed.

Constraint-based Local Search

by Pascal Van Hentenryck Laurent Michel

The ubiquity of combinatorial optimization problems in our society is illustrated by the novel application areas for optimization technology, which range from supply chain management to sports tournament scheduling. Over the last two decades, constraint programming has emerged as a fundamental methodology to solve a variety of combinatorial problems, and rich constraint programming languages have been developed for expressing and combining constraints and specifying search procedures at a high level of abstraction. Local search approaches to combinatorial optimization are able to isolate optimal or near-optimal solutions within reasonable time constraints.This book introduces a method for solving combinatorial optimization problems that combines constraint programming and local search, using constraints to describe and control local search, and a programming language, COMET, that supports both modeling and search abstractions in the spirit of constraint programming.After an overview of local search including neighborhoods, heuristics, and metaheuristics, the book presents the architecture and modeling and search components of constraint-based local search and describes how constraint-based local search is supported in COMET. The book describes a variety of applications, arranged by meta-heuristics. It presents scheduling applications, along with the background necessary to understand these challenging problems. The book also includes a number of satisfiability problems, illustrating the ability of constraint-based local search approaches to cope with both satisfiability and optimization problems in a uniform fashion.

The Amazon Incubator: Grow Your Business or Hatch a New One

by Lesley Hensell

The real story about how to be a successful seller on Amazon, from a leading consultant. Amazon is the most powerful business incubator in the history of the world. Unfortunately, where there is great opportunity, get-rich-quick schemes abound. Most available books about selling on Amazon peddle a dream that is unattainable for sellers. They promise riches at the cost of only five hours a week, or a long-term income for an initial investment of just $1,000.The Amazon Incubator is different. This book instead offers realistic, sustainable strategies for building a long-term, profitable business on Amazon. Whether sellers are burgeoning entrepreneurs or own the ecommerce channel at an established brand, they will benefit from the strategic thinking and in-depth Amazon know-how delivered in an easily digestible format. The reader will be guided through exercises to define their goals, determine their product set, and execute like a champ. The Amazon Incubator is written in short, easy-to-digest chapters that include case studies and real-world examples of Amazon seller success and failure. Readers will better identify with and understand the information when case studies are included. In addition, each chapter includes a brief summary at the end, as well as suggested action steps, so it can easily be used as a tool for the reader to share with teammates and business associates.

Practical LTE based security forces PMR networks

by Arnaud Henry-Labordère

Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.

Catalog of the Heteroptera or True Bugs, of Canada and the Continental United States

by Thomas J. Henry

A primary aim of this catalog is to offer an accounting for each species as originally proposed and for the first usage only of all its name combinations (including valid names, synonymies, and misspellings) that have been published for our area. We follow the policy outlined by the 1985 Code of Zoological Nomenclature for nonmenclatorial proposes that a dissertation for an advanced educational degree is not published unless it satisfies the criteria present in Articles 8 and 9.

Web Accessibility: Web Standards and Regulatory Compliance

by Shawn Lawton Henry Andrew Kirkpatrick Patrick H. Lauke Bruce Lawson Bob Regan Richard Rutter Mark Urban Christian Heilmann Cynthia Waddell Jim Thatcher Michael R. Burks

The power of the Web lies in the fact that anyone and everyone can access it. However, this should also extend to users with disabilities--accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing websites that don't exclude these people from accessing the content or services being provided. This isn't difficult to do, and doesn't require anything more than your normal toolset, be it HTML, CSS, JavaScript, Flash, or whatever else. All you need to do is use these tools in the right way, and bear in mind the guidelines that exist to help you keep your web sites accessible, and the laws that enforce web accessibility around the world. This book gives you all you need to know about web accessibility, whether you are a web designer or developer who wants their sites to be accessible, or a business manager who wants to learn what impact the web accessibility laws have on their businesses' web sites.

Penetration Testing

by Kevin M. Henry

Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting. Special attention is also paid to new technologies that improve business operations, but which can create new vulnerabilities, such as employee remote access, wireless communications and public-facing web applications. This book will give you a better understanding of how to conduct a penetration test, and also how to deliver a client-focused report that assesses the security of the system and whether the level of risk to the organization is within acceptable levels. Kevin Henry has 35 years' experience working on computer systems, initially as a computer operator, and then in various programmer and analyst roles, before moving into audit and security. Kevin currently provides security auditing, training and educational programs for major clients and governments around the world and is a frequent speaker on the security conference circuit. A business-aligned approach to penetration testing!

Refine Search

Showing 34,051 through 34,075 of 53,723 results