Book picks similar to
Introduction to Theoretical Computer Science by Boaz Barak
computer-science
cyber
textbooks
Family Nurse Practitioner Certification Intensive Review: Fast Facts and Practice Questions
Maria T. Codina Leik - 2007
Using test-taking strategies meticulously developed by the author, the Review provides unique question dissection techniques, targeted key content review, 600 in-depth practice questions, and detailed, current exam information in a fast facts style. This second edition includes new chapters on pediatrics and adolescence and an extensive new section on geriatrics that encompasses body/metabolic changes, common disorders, and hospice/ethical considerations. The book also presents an expanded, intensive pharmacology review, 100 new exam questions, and is the only review to offer a new research chapter providing elements of research needed for E-B practice.The book reviews the complete lifespan from pediatrics to geriatrics and including pregnancy, and covers non-clinical content including ethics, medico-legal issues, advanced practice law, and reimbursement guidelines. The review of primary care disorders is organized by body system. The content is applicable for certification exams for both the ANCC and the AANP. This book is also a great companion to the FNP Certification Review app, coming soon for your iPhone or iPad!New to this edition: Reorganized for greater ease of useProvides extensive new section on geriatricsContains expanded coverage of pediatrics and adolescenceOffers expanded intensive-style pharmacology reviewPresents elements of research needed for E-B practiceIncludes 100 new questions for a title of 600 high-yield questionsWhy use this review?Delineates strategic question dissection techniques for study success developed by the author, a leading provider of exam preparation education for over 20 yearsProvides precisely targeted content reviewOffers 600 in-depth practice questions and detailed exam informationIncludes Exam Tips and Clinical Tips to help prioritize test content.It is the only book to present elements of research needed for E-B practiceOutlines normal findings and benign variants in physical assessment of each body systemIncludes succinct review of diseases commonly seen in primary careIt's a great companion to the forthcoming FNP Certification Review app!
Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)
Artemis Caro - 2017
As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn:
A Brief History of Blockchain Technology
Blockchain Basics: Managing Digital Transactions
What is a Distributed Ledger?
Blockchain Beyond Bitcoin
Implications Of Blockchain: Big Data, Privacy & Personal Data
Profiting from Blockchain Technologies
Limitations & Challenges of Blockchain
The Future of Blockchain
For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets.
This is ALL About To Change...
Make sure you take action and join the Financial Revolution by reading this book!
Google Hacking: An Ethical Hacking Guide To Google
Ankit Fadia - 2007
Google Hacking teaches people how to get the most out of this revolutionary search engine. Not only will this book teach readers how Google works, but it will also empower them with the necessary skills to make their everyday searches easier, more efficient, and more productive. Google Hacking also demonstrates how Google can be used for negative means. It's immense searching power, means that everyone, including cyber criminals, can feasibly access confidential data, such as company presentations, budgets, blueprints, even credit card numbers, with just the click of a mouse. Using numerous examples, case studies, and screenshots, this book explains the art of ethical Google Hacking -- it not only teaches readers how Google works, but it provides them with the knowledge they need to protect their data and systems from getting Google Hacked. This is the only book you need to maximize (and protect yourself) from Google searches!
Practical Cryptography
Niels Ferguson - 2003
The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
Computer Science Illuminated
Nell B. Dale - 2002
Written By Two Of Today'S Most Respected Computer Science Educators, Nell Dale And John Lewis, The Text Provides A Broad Overview Of The Many Aspects Of The Discipline From A Generic View Point. Separate Program Language Chapters Are Available As Bundle Items For Those Instructors Who Would Like To Explore A Particular Programming Language With Their Students. The Many Layers Of Computing Are Thoroughly Explained Beginning With The Information Layer, Working Through The Hardware, Programming, Operating Systems, Application, And Communication Layers, And Ending With A Discussion On The Limitations Of Computing. Perfect For Introductory Computing And Computer Science Courses, Computer Science Illuminated, Third Edition's Thorough Presentation Of Computing Systems Provides Computer Science Majors With A Solid Foundation For Further Study, And Offers Non-Majors A Comprehensive And Complete Introduction To Computing.
Understanding Cryptography: A Textbook For Students And Practitioners
Christof Paar - 2009
Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.
Artificial Intelligence for Humans, Volume 1: Fundamental Algorithms
Jeff Heaton - 2013
This book teaches basic Artificial Intelligence algorithms such as dimensionality, distance metrics, clustering, error calculation, hill climbing, Nelder Mead, and linear regression. These are not just foundational algorithms for the rest of the series, but are very useful in their own right. The book explains all algorithms using actual numeric calculations that you can perform yourself. Artificial Intelligence for Humans is a book series meant to teach AI to those without an extensive mathematical background. The reader needs only a knowledge of basic college algebra or computer programming—anything more complicated than that is thoroughly explained. Every chapter also includes a programming example. Examples are currently provided in Java, C#, R, Python and C. Other languages planned.
Java 2: The Complete Reference
Herbert Schildt - 2000
This book is the most complete and up-to-date resource on Java from programming guru, Herb Schildt -- a must-have desk reference for every Java programmer.
Web Development and Design Foundations with Html5
Terry Felke-Morris - 2012
A well-rounded balance of hard skills (HTML5, XHTML, CSS, JavaScript) and soft skills (Web Design, e-commerce, Web site promotion strategies) presents everything beginning Web developers need to know to build and promote successful Web sites.
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
Mike Meyers - 1999
The book offers clear instruction and real-world examples from training expert and bestselling author Mike Meyers along with hundreds of accurate practice questions.Fulfilling the promise of the All-in-One series, this complete reference serves both as a study tool and a valuable on-the-job reference that will serve readers beyond the exam. CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) also includes access to free video training and interactive hands-on labs and simulations that prepare you for difficult performance-based questions. A valuable pre-assessment test enables readers to gauge their familiarity with the test’s objectives and tailor an effective course for study.-Contains complete coverage of every objective for the CompTIA Network+ Certification exam-Written by CompTIA training and certification guru Mike Meyers- Electronic content includes the Total Tester exam simulator with over 100 practice questions, over an hour of training videos, and a collection of Mike Meyers’ favorite shareware and freeware networking utilities
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
Chris Eagle - 2008
With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Michael Hale Ligh - 2010
Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
Foundations of Software Testing ISTQB Certification
Rex Black - 2006
Completely updated to comprehensively reflect the most recent changes to the ISTQB Foundation Syllabus, the book adopts a practical, hands-on approach, covering the fundamental topics that every system and software tester should know. The authors are themselves developers of the ISTQB syllabus and are highly respected international authorities, teachers and authors within the field of software testing.
Handbook of Applied Cryptography
Alfred J. Menezes - 1996
Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.