Browse Results

Showing 58,526 through 58,550 of 62,964 results

Threat Hunting with Elastic Stack: Solve complex security challenges with integrated prevention, detection, and response

by Andrew Pease

Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security features with the help of practical examplesKey FeaturesGet started with Elastic Security configuration and featuresUnderstand how to use Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook DescriptionElastic Security is an open solution that equips professionals with the tools to prevent, detect, and respond to threats. Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network. You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations. You'll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. Further, you'll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities. By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.What you will learnExplore cyber threat intelligence analytical models and hunting methodologiesBuild and configure Elastic Stack for cyber threat huntingLeverage the Elastic endpoint and Beats for data collectionPerform security data analysis using the Kibana Discover, Visualize, and Dashboard appsExecute hunting and response operations using the Kibana Security appUse Elastic Common Schema to ensure data uniformity across organizationsWho this book is forSecurity analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.

Threat Level Red: Cybersecurity Research Programs of the U.S. Government

by Michael Erbschloe

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

Threat Modeling

by Frank Swiderski Window Snyder

<div xmlns="http://www.w3.org/1999/xhtml"><p>Delve into the threat modeling methodology used by Microsoft\u2019s security experts to identify security risks, verify an application\u2019s security architecture, and develop countermeasures in the design, coding, and testing phases.</p></div>

Threat Modeling

by Izar Tarandach Matthew J. Coles

Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats.Contrary to popular belief, threat modeling doesn't require advanced security knowledge to initiate or a Herculean effort to sustain. But it is critical for spotting and addressing potential concerns in a cost-effective way before the code's written--and before it's too late to find a solution. Authors Izar Tarandach and Matthew Coles walk you through various ways to approach and execute threat modeling in your organization.Explore fundamental properties and mechanisms for securing data and system functionalityUnderstand the relationship between security, privacy, and safetyIdentify key characteristics for assessing system securityGet an in-depth review of popular and specialized techniques for modeling and analyzing your systemsView the future of threat modeling and Agile development methodologies, including DevOps automationFind answers to frequently asked questions, including how to avoid common threat modeling pitfalls

Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture

by Brett Crawley

Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutionsKey FeaturesApply threat modeling principles effectively with step-by-step instructions and support materialExplore practical strategies and solutions to address identified threats, and bolster the security of your software systemsDevelop the ability to recognize various types of threats and vulnerabilities within software systemsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAre you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay. Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You’ll explore the methodology for threat modeling—Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you’ll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems. By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks.What you will learnUnderstand the Elevation of Privilege card game mechanicsGet to grips with the S.T.R.I.D.E. threat modeling methodologyExplore the Privacy and T.R.I.M. extensions to the gameIdentify threat manifestations described in the gamesImplement robust security measures to defend against the identified threatsComprehend key points of privacy frameworks, such as GDPR to ensure complianceWho this book is forThis book serves as both a reference and support material for security professionals and privacy engineers, aiding in facilitation or participation in threat modeling sessions. It is also a valuable resource for software engineers, architects, and product managers, providing concrete examples of threats to enhance threat modeling and develop more secure software designs. Furthermore, it is suitable for students and engineers aspiring to pursue a career in application security. Familiarity with general IT concepts and business processes is expected.

Threat Modeling: Designing for Security

by Adam Shostack

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

Threatening Communications and Behavior: Perspectives on the Pursuit of Public Figures

by National Research Council of the National Academies

Today's world of rapid social, technological, and behavioral change provides new opportunities for communications with few limitations of time and space. Through these communications, people leave behind an ever-growing collection of traces of their daily activities, including digital footprints provided by text, voice, and other modes of communication. Meanwhile, new techniques for aggregating and evaluating diverse and multimodal information sources are available to security services that must reliably identify communications indicating a high likelihood of future violence. In the context of this changed and changing world of communications and behavior, the Board on Behavioral, Cognitive, and Sensory Sciences of the National Research Council presents this volume of three papers as one portion of the vast subject of threatening communications and behavior. The papers review the behavioral and social sciences research on the likelihood that someone who engages in abnormal and/or threatening communications will actually then try to do harm. The focus is on how the scientific knowledge can inform and advance future research on threat assessments, in part by considering the approaches and techniques used to analyze communications and behavior in the dynamic context of today's world. The papers in the collection were written within the context of protecting high-profile public figures from potential attach or harm. The research, however, is broadly applicable to U.S. national security including potential applications for analysis of communications from leaders of hostile nations and public threats from terrorist groups. This work highlights the complex psychology of threatening communications and behavior, and it offers knowledge and perspectives from multiple domains that contribute to a deeper understanding of the value of communications in predicting and preventing violent behaviors.

Threats: What Every Engineer Should Learn From Star Wars

by Adam Shostack

Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You’ll move from thinking of security issues as clever one-offs and learn to see the patterns they follow. This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don’t need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master. You’ll also find: Understandable and memorable introductions to the most important threats that every engineer should know Straightforward software security frameworks that will help engineers bake security directly into their systems Strategies to align large teams to achieve application security in today’s fast-moving and agile world Strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaignsAn indispensable resource for software developers and security engineers, Threats: What Every Engineer Should Learn From Star Wars belongs on the bookshelves of everyone delivering or operating technology: from engineers to executives responsible for shipping secure code.

Three Weeks to Ebay Profits: Go from Beginner to Successful Seller in Less Than a Month (revised edition)

by Skip Mcgrath

The essential guide to building an eBay business and making money in just twenty-one days--now with information on the company's new modified fee structures, feedback system, and other changes.

Three Weeks to eBay® Profits, Revised Edition: Go from Beginner to Successful Seller in Less than a Month

by Skip McGrath

Solid gold information from a Gold-level seller! Veteran eBay expert and author Skip McGrath presents a completely updated guide to the new, drastically altered site.Under its new management, eBay has instituted many important changes, and this revised edition addresses the company’s modified fee structures, new (and controversial) feedback system, and more, while guiding sellers through the steps of starting, expanding, and automating a successful eBay business. McGrath offers tips on what’s popular with eBay’s buyers, as well as on drop shipping, controlling costs, managing inventory, writing headlines and descriptions that sell, launching your first auctions, and more.

Three Weeks to eBay® Profits, Third Edition: Go From Beginner to Successful Seller in Less than a Month

by Skip McGrath

Since its release, Skip McGraths classic guide to eBay® has been a bestseller—and this completely updated edition will help you navigate the popular websites sweeping rule changes. It covers all the revised features, from the new Top Rated Seller designation to the widespread integration of services such as Paypal and automated UPS/USPS shipping. Sellers will make more money than ever!

Three-Dimensional Design Methodologies for Tree-based FPGA Architecture

by Vinod Pangracious Zied Marrakchi Habib Mehrez

This book focuses on the development of 3D design and implementation methodologies for Tree-based FPGA architecture. It also stresses the needs for new and augmented 3D CAD tools to support designs such as, the design for 3D, to manufacture high performance 3D integrated circuits and reconfigurable FPGA-based systems. This book was written as a text that covers the foundations of 3D integrated system design and FPGA architecture design. It was written for the use in an elective or core course at the graduate level in field of Electrical Engineering, Computer Engineering and Doctoral Research programs. No previous background on 3D integration is required, nevertheless fundamental understanding of 2D CMOS VLSI design is required. It is assumed that reader has taken the core curriculum in Electrical Engineering or Computer Engineering, with courses like CMOS VLSI design, Digital System Design and Microelectronics Circuits being the most important. It is accessible for self-study by both senior students and professionals alike.

Three-Dimensional Imaging, Visualization, and Display

by Bahram Javidi Fumio Okano Jung-Young Son

This book will describe recent developments, as well as the prospects and challenges facing 3D moving picture systems and devices, including binocular, multi-view, holographic, and image reproduction techniques. Optical systems, display instruments, and image capture techniques will be covered. The online supplement will include full color movies of experiments describing recent advances in 3D movies. This is the first state-of-the-art book on this subject that efficiently integrating the background material with new advances and applications and includes movies of 3D display systems.

Three.js Cookbook

by Jos Dirksen

This book is ideal for anyone who already knows JavaScript and would like to get a broad understanding of Three.js quickly, or for those of you who have a basic grasp of using Three.js but want to really make an impact with your 3D visualizations by learning its advanced features. To apply the recipes in this book you don't need to know anything about WebGL; all you need is some general knowledge about JavaScript and HTML.

Three.js Essentials

by Jos Dirksen

This book is an easy-to-follow guide that shows the essential parts of Three.js through a set of extensive examples. Through the explanation of these examples, you'll learn everything you need to know about Three.js. If you already know JavaScript and want to quickly learn the essentials of Three.js, this book is for you. No prior knowledge of Three.js, WebGL, 3D modelling, or Maths is required.

Thrive: Maximizing Well-Being in the Age of AI

by Anindya Ghose Ravi Bapna

How AI can positively impact so many aspects of our daily lives, from health and wellness to work, education, and home life.Artificial intelligence (AI) is a powerful general-purpose technology that is reshaping the modern economy, but misperceptions about AI stand in the way of harnessing it for the betterment of humanity. In Thrive, Ravi Bapna and Anindya Ghose counter the backlash by showcasing how AI is positively influencing the aspects of our daily lives that we care about most: our health and wellness, relationships, education, the workplace, and domestic life. In the process the authors help explain the underlying technology and give people the agency they need to shape the debate around how we should regulate AI to maximize its benefits and minimize its risks.Bringing over two decades of experience with cutting-edge research, consulting, executive coaching, and advising to bear on the subject, Bapna and Ghose demystify the technology of AI itself. They offer a novel &“House of AI&” framework that encompasses traditional analytics, generative AI, and fair and ethical deployment of AI. Using examples from everyday life, they showcase how the modern AI-powered ecosystem fundamentally improves the emotional, physical, and material well-being of regular people across the globe. Thrive&’s mission is to educate the public about AI, shape realistic expectations, and foster informed discussions about a fast-emerging AI-shaped society.

Thriving Rough Sets

by Dominik Ślęzak Yiyu Yao Andrzej Skowron Guoyin Wang Lech Polkowski

This special book is dedicated to the memory of Professor Zdzisław Pawlak, the father of rough set theory, in order to commemorate both the 10th anniversary of his passing and 35 years of rough set theory. The book consists of 20 chapters distributed into four sections, which focus in turn on a historical review of Professor Zdzisław Pawlak and rough set theory; a review of the theory of rough sets; the state of the art of rough set theory; and major developments in rough set based data mining approaches. Apart from Professor Pawlak's contributions to rough set theory, other areas he was interested in are also included. Moreover, recent theoretical studies and advances in applications are also presented. The book will offer a useful guide for researchers in Knowledge Engineering and Data Mining by suggesting new approaches to solving the problems they encounter.

Thriving Systems Theory and Metaphor-Driven Modeling

by Leslie J. Waguespack

How is it that one system is more effective, appealing, satisfying and/or more beautiful than another to its stakeholder community? This question drove Christopher Alexander's fifty-year quest to explain great physical architecture and gave birth to pattern-languages for building that underpin much of modern systems engineering. How is it that so many individual stakeholders consistently recognize the same quality, the same beauty in a system? This question led George Lakoff to research the role of conceptual metaphor in human understanding. What is essential to stakeholders' satisfaction with systems? Fred Brooks, in his publications, addressed this question. This monograph fuses these diverse streams of thought in proposing Thriving Systems Theory by translating Alexander's properties of physical design quality into the abstract domain of information systems and modeling. Metaphor-Driven Modeling incorporates the theory while examining its impact throughout the system life cycle: modeling, design and deployment. The result is holistic and innovative, a perspective on system quality invaluable to students, practitioners and researchers of software and systems engineering.

Thriving as an Online K-12 Educator: Essential Practices from the Field

by Jody Peerless Green

Thriving as an Online K-12 Educator is the perfect all-in-one guide to taking your K-12 class online. We know, now more than ever, that teachers have not been equally or systematically trained and resourced to make a sudden transition to online or blended instruction. This concise, accessible book collects time-tested strategies and fresh perspectives from experienced educators to help you smooth out even the most abrupt shift to technology-enhanced teaching and learning. With these insights into institutional supports, effective digital tools, equitable practice, social-emotional considerations, and beyond, you will be better prepared than ever to help your students thrive in online and blended learning environments.

Thriving in Digital Workspaces: Emerging Issues for Research and Practice

by Melinde Coetzee

This edited volume focuses on innovative solutions to the debate on human thriving in the fast emerging technology-driven cyber-physical work context, also called Industry 4.0. The volume asks the important question: How can people remain relevant and thrive in workplaces that are increasingly virtual, technology-driven, and imbued with artificial intelligence? This volume includes two major streams of discussion: it provides multidisciplinary perspectives on what thriving could mean for individuals, managers and organisations in current and future non-linear and Web-driven workspaces. In this context, it points to the need to rethink the curricula of the psychology of human thriving so that it is applicable to Industry 4.0. Second, it discusses the new platforms of learning opening up in organisations and the ways and means with which people's learning practices can be adapted to changing scenarios. Some of these scenarios are: changing job designs and talent requirements; the demand for creativity; the need for virtual teams and intercultural collaborations; and changing emotional competencies. This topical volume includes contributions by scholars from across the world, and is of interest to scholars, practitioners and postgraduate students of psychology, organizational behaviour and human resource management.

Through Optimization of Aerospace Vehicle Trajectories by the Pontryagin Maximum Principle (Studies in Systems, Decision and Control #579)

by Alexander S. Filatyev Vyacheslav G. Petukhov

This monograph investigates the trajectory optimization problems of low- and finite-thrust aerospace vehicles and spacecraft using an indirect method based on the Pontryagin maximum principle, providing a methodological basis for the construction of numerical techniques that are superior in versatility and accuracy to direct methods. This book provides a theoretical explanation of the approaches used and also an extensive gallery of the results of practical numerical studies. The problem of boundary value problem convergence has been largely overcome, which has made it possible to practically automate the optimization of trajectories and to achieve a qualitative generalization with a number of fundamentally new results. Examples of practical optimization of branching trajectories of complex dynamics systems with finite and continual sets of branches, in deterministic and stochastic statements, with control constraints and phase constraints of various orders are demonstrated. An emphasis is placed on the consistent application of methods of numerical continuation with respect to a parameter to solve various problems in the flight mechanics of spacecraft with an electric propulsion system (EPS). The problems considered include the optimization of direct interplanetary flights of spacecraft with thrusters having limited power or limited thrust, of interplanetary flights of such spacecraft using gravity assisted maneuvers, of multi-orbit interorbital transfers of spacecraft with limited-thrust EPS. As a result, it was possible to develop a set of numerical continuation methods for solving a wide range of optimization problems for spacecraft trajectories with EPS with improved characteristics in terms of convergence and performance. This monograph also contains a description of many pitfalls in solving a wide range of problems of optimizing the trajectories of aerospace vehicles and recipes for effectively overcoming them.

Through the Grapevine: Socially Transmitted Information and Distorted Democracy (Chicago Studies in American Politics)

by Taylor N. Carlson

An enlightening examination of what it means when Americans rely on family and friends to stay on top of politics. Accurate information is at the heart of democratic functioning. For decades, researchers interested in how information is disseminated have focused on mass media, but the reality is that many Americans today do not learn about politics from direct engagement with the news. Rather, about one-third of Americans learn chiefly from information shared by their peers in conversation or on social media. How does this socially transmitted information differ from that communicated by traditional media? What are the consequences for political attitudes and behavior? Drawing on evidence from experiments, surveys, and social media, Taylor N. Carlson finds that, as information flows first from the media then person to person, it becomes sparse, more biased, less accurate, and more mobilizing. The result is what Carlson calls distorted democracy. Although socially transmitted information does not necessarily render democracy dysfunctional, Through the Grapevine shows how it contributes to a public that is at once underinformed, polarized, and engaged.

Ti-84 Plus Graphing Calculator For Dummies

by Mccall Edwards

Get up-to-speed on the functionality of your TI-84 Plus calculatorCompletely revised to cover the latest updates to the TI-84 Plus calculators, this bestselling guide will help you become the most savvy TI-84 Plus user in the classroom! Exploring the standard device, the updated device with USB plug and upgraded memory (the TI-84 Plus Silver Edition), and the upcoming color screen device, this book provides you with clear, understandable coverage of the TI-84's updated operating system. Details the new apps that are available for download to the calculator via the USB cable Walks you through menus and basic arithmeticAddresses graphing and analyzing functions as well as probability and statistics functionsExplains how to use the calculator for geometryReviews communicating with PCs and other calculatorsTI-84 Plus Graphic Calculator For Dummies, 2nd Edition is the perfect solution for getting comfortable with the new line of TI-84 calculators!

TiVo Hacks: 100 Industrial-Strength Tips & Tools

by Raffi Krikorian

TiVo Hacks helps you get the most out of your TiVo personal video recorder. Armed with just a screwdriver and basic understanding of PC hardware (or willingness to learn), preeminent hackability awaits. This book includes hacks for changing the order of recorded programs, activating the 30-second skip to blaze through commercials, upgrading TiVo's hard drive for more hours of recording, use of TiVo's Home Media Option to remotely schedule a recording via the Web, log in to the serial port for command-line access to programming data, log files, closed-captioning data, display graphics on the TiVo screen, and even play MP3s.Readers who use advanced hacks to put TiVo on their home network via the serial port, Ethernet, USB, or wireless (with 802.11b WiFi) will watch a whole new world open up. By installing various open source software packages, you can use TiVo for mail, instant messaging, caller-ID, and more. It's also easy to run a web server on TiVo to schedule recordings, access lists of recorded shows, and even display them on a web site. While TiVo gives viewers personalized control of their TVs, TiVo Hacks gives users personalized control of TiVo.Note: Not all TiVos are the same. The original TiVo, the Series 1, is the most hackable TiVo out there; it's a box thrown together with commodity parts and the TiVo code is running on open hardware. The Series 2 TiVo, the most commonly sold TiVo today, is not open. You won't see hacks in this book that involve modifying Series 2 software.

Tidy First?: A Personal Exercise in Empirical Software Design

by Kent Beck

Tidying up messy software is a must. And that means breaking up the code to make it more readable, and using guard clauses and helping functions to make it understandable. In this practical guide, author Kent Beck, creator of Extreme Programming and pioneer of software patterns, suggests when and where you might apply tidyings in your code.Instead of trying to master tidying all at once, this book lets you try out a few examples that make sense for your problem. If you have a big function containing many lines of code, you'll learn how to logically divide it into smaller chunks. Along the way, you'll learn the theory behind software design: coupling, cohesion, discounted cash flows, and optionality.

Refine Search

Showing 58,526 through 58,550 of 62,964 results