Résultats de recherche de titre
Articles 1 à 20 sur 2628
Building a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseHacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun…
reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminalsThe Princeton Encyclopedia of Islamic Political Thought
Par Richard Bulliet, David Cook, Roxanne L. Euben, Khaled Fahmy, Frank Griffel, Bernard Haykel, Robert W. Hefner, Timur Kuran, Jane McAuliffe, Ebrahim Moosa. 2013
An indispensable guide to Islamic political thought from Muhammad to the twenty-first centuryThe first encyclopedia of Islamic political thought from…
the birth of Islam to today, this comprehensive, authoritative, and accessible reference provides the context needed for understanding contemporary politics in the Islamic world and beyond. With more than 400 alphabetically arranged entries written by an international team of specialists, the volume focuses on the origins and evolution of Islamic political ideas and related subjects, covering central terms, concepts, personalities, movements, places, and schools of thought across Islamic history. Fifteen major entries provide a synthetic treatment of key topics, such as Muhammad, jihad, authority, gender, culture, minorities, fundamentalism, and pluralism. Incorporating the latest scholarship, this is an indispensable resource for students, researchers, journalists, and anyone else seeking an informed perspective on the complex intersection of Islam and politics.Includes more than 400 concise, alphabetically arranged entriesFeatures 15 in-depth entries on key topicsCovers topics such as:Central themes and sources of Islamic political thought: caliph, modernity, knowledge, shari'a, government, revival and reformModern concepts, institutions, movements, and parties: civil society, Islamization, secularism, veil, Muslim BrotherhoodIslamic law and traditional Islamic societies: justice, taxation, fatwa, dissent, governance, piety and asceticism, trade and commerceSects, schools, regions, and dynasties: Mu'tazilis, Shi'ism, Quraysh, Mecca and Medina, Baghdad, Indonesia, Nigeria, Central Asia, OttomansThinkers, personalities, and statesmen: Mawardi, Shafi'I, Saladin, Tamerlane, Akbar, Atatürk, Nasser, KhomeiniContains seven historical and contemporary maps of Muslim empires, postcolonial nation-states, populations, and settlementsGuides readers to further research through bibliographies, cross-references, and an indexGoogle's PageRank and Beyond: The Science of Search Engine Rankings
Par Amy N. Langville, Carl D. Meyer. 2006
Why doesn't your home page appear on the first page of search results, even when you query your own name?…
How do other web pages always appear at the top? What creates these powerful rankings? And how? The first book ever about the science of web page rankings, Google's PageRank and Beyond supplies the answers to these and other questions and more. The book serves two very different audiences: the curious science reader and the technical computational reader. The chapters build in mathematical sophistication, so that the first five are accessible to the general academic reader. While other chapters are much more mathematical in nature, each one contains something for both audiences. For example, the authors include entertaining asides such as how search engines make money and how the Great Firewall of China influences research. The book includes an extensive background chapter designed to help readers learn more about the mathematics of search engines, and it contains several MATLAB codes and links to sample web data sets. The philosophy throughout is to encourage readers to experiment with the ideas and algorithms in the text. Any business seriously interested in improving its rankings in the major search engines can benefit from the clear examples, sample code, and list of resources provided. Many illustrative examples and entertaining asides MATLAB code Accessible and informal style Complete and self-contained section for mathematics reviewNumerical Algorithms for Personalized Search in Self-organizing Information Networks
Par Sep Kamvar. 2011
This book lays out the theoretical groundwork for personalized search and reputation management, both on the Web and in peer-to-peer…
and social networks. Representing much of the foundational research in this field, the book develops scalable algorithms that exploit the graphlike properties underlying personalized search and reputation management, and delves into realistic scenarios regarding Web-scale data.Sep Kamvar focuses on eigenvector-based techniques in Web search, introducing a personalized variant of Google's PageRank algorithm, and he outlines algorithms--such as the now-famous quadratic extrapolation technique--that speed up computation, making personalized PageRank feasible. Kamvar suggests that Power Method-related techniques ultimately should be the basis for improving the PageRank algorithm, and he presents algorithms that exploit the convergence behavior of individual components of the PageRank vector. Kamvar then extends the ideas of reputation management and personalized search to distributed networks like peer-to-peer and social networks. He highlights locality and computational considerations related to the structure of the network, and considers such unique issues as malicious peers. He describes the EigenTrust algorithm and applies various PageRank concepts to P2P settings. Discussion chapters summarizing results conclude the book's two main sections.Clear and thorough, this book provides an authoritative look at central innovations in search for all of those interested in the subject.More stimulating mathematics puzzles from bestselling author Paul NahinHow do technicians repair broken communications cables at the bottom of the…
ocean without actually seeing them? What's the likelihood of plucking a needle out of a haystack the size of the Earth? And is it possible to use computers to create a universal library of everything ever written or every photo ever taken? These are just some of the intriguing questions that best-selling popular math writer Paul Nahin tackles in Number-Crunching. Through brilliant math ideas and entertaining stories, Nahin demonstrates how odd and unusual math problems can be solved by bringing together basic physics ideas and today's powerful computers. Some of the outcomes discussed are so counterintuitive they will leave readers astonished.Nahin looks at how the art of number-crunching has changed since the advent of computers, and how high-speed technology helps to solve fascinating conundrums such as the three-body, Monte Carlo, leapfrog, and gambler's ruin problems. Along the way, Nahin traverses topics that include algebra, trigonometry, geometry, calculus, number theory, differential equations, Fourier series, electronics, and computers in science fiction. He gives historical background for the problems presented, offers many examples and numerous challenges, supplies MATLAB codes for all the theories discussed, and includes detailed and complete solutions.Exploring the intimate relationship between mathematics, physics, and the tremendous power of modern computers, Number-Crunching will appeal to anyone interested in understanding how these three important fields join forces to solve today's thorniest puzzles.Computational Economics
Par David A. Kendrick, P. Ruben Mercado, Hans M. Amman. 2006
The ability to conceptualize an economic problem verbally, to formulate it as a mathematical model, and then represent the mathematics…
in software so that the model can be solved on a computer is a crucial skill for economists. Computational Economics contains well-known models--and some brand-new ones--designed to help students move from verbal to mathematical to computational representations in economic modeling. The authors' focus, however, is not just on solving the models, but also on developing the ability to modify them to reflect one's interest and point of view. The result is a book that enables students to be creative in developing models that are relevant to the economic problems of their times. Unlike other computational economics textbooks, this book is organized around economic topics, among them macroeconomics, microeconomics, and finance. The authors employ various software systems--including MATLAB, Mathematica, GAMS, the nonlinear programming solver in Excel, and the database systems in Access--to enable students to use the most advantageous system. The book progresses from relatively simple models to more complex ones, and includes appendices on the ins and outs of running each program. The book is intended for use by advanced undergraduates and professional economists and even, as a first exposure to computational economics, by graduate students. Organized by economic topics Progresses from simple to more complex models Includes instructions on numerous software systems Encourages customization and creativityThe Silicon Jungle: A Novel of Deception, Power, and Internet Intrigue
Par Shumeet Baluja. 2011
A suspenseful story about the dangers of unknowingly revealing our most intimate thoughts and actions onlineWhat happens when a naive…
intern is granted unfettered access to people's most private thoughts and actions? Stephen Thorpe lands a coveted internship at Ubatoo, an Internet empire that provides its users with popular online services, from a search engine and e-mail, to social networking. When Stephen’s boss asks him to work on a project with the American Coalition for Civil Liberties, Stephen innocently obliges, believing he is mining Ubatoo’s vast databases to protect people unfairly targeted in the name of national security. But nothing is as it seems. Suspicious individuals surface, doing all they can to access Ubatoo’s wealth of confidential information. This need not require technical wizardry—simply knowing how to manipulate a well-intentioned intern may be enough.The Silicon Jungle is a cautionary fictional tale of data mining’s promise and peril. Baluja raises ethical questions about contemporary technological innovations, and how minute details can be routinely pieced together into rich profiles that reveal our habits, goals, and secret desires—all ready to be exploited.Trapped in the Net: The Unanticipated Consequences of Computerization
Par Gene I. Rochlin. 1998
Voice mail. E-mail. Bar codes. Desktops. Laptops. Networks. The Web. In this exciting book, Gene Rochlin takes a closer look…
at how these familiar and pervasive productions of computerization have become embedded in all our lives, forcing us to narrow the scope of our choices, our modes of control, and our experiences with the real world. Drawing on fascinating narratives from fields that range from military command, air traffic control, and international fund transfers to library cataloging and supermarket checkouts, Rochlin shows that we are rapidly making irreversible and at times harmful changes in our business, social, and personal lives to comply with the formalities and restrictions of information systems. The threat is not the direct one once framed by the idea of insane robots or runaway mainframes usurping human functions for their own purposes, but the gradual loss of control over hardware, software, and function through networks of interconnection and dependence. What Rochlin calls the computer trap has four parts: the lure, the snare, the costs, and the long-term consequences. The lure is obvious: the promise of ever more powerful and adaptable tools with simpler and more human-centered interfaces. The snare is what usually ensues. Once heavily invested in the use of computers to perform central tasks, organizations and individuals alike are committed to new capacities and potentials, whether they eventually find them rewarding or not. The varied costs include a dependency on the manufacturers of hardware and software--and a seemingly pathological scramble to keep up with an incredible rate of sometimes unnecessary technological change. Finally, a lack of redundancy and an incredible speed of response make human intervention or control difficult at best when (and not if) something goes wrong. As Rochlin points out, this is particularly true for those systems whose interconnections and mechanisms are so deeply concealed in the computers that no human being fully understands them.Discrete and Computational Geometry
Par Satyan L. Devadoss, Joseph O'Rourke. 2011
An essential introduction to discrete and computational geometryDiscrete geometry is a relatively new development in pure mathematics, while computational geometry…
is an emerging area in applications-driven computer science. Their intermingling has yielded exciting advances in recent years, yet what has been lacking until now is an undergraduate textbook that bridges the gap between the two. Discrete and Computational Geometry offers a comprehensive yet accessible introduction to this cutting-edge frontier of mathematics and computer science.This book covers traditional topics such as convex hulls, triangulations, and Voronoi diagrams, as well as more recent subjects like pseudotriangulations, curve reconstruction, and locked chains. It also touches on more advanced material, including Dehn invariants, associahedra, quasigeodesics, Morse theory, and the recent resolution of the Poincaré conjecture. Connections to real-world applications are made throughout, and algorithms are presented independently of any programming language. This richly illustrated textbook also features numerous exercises and unsolved problems.The essential introduction to discrete and computational geometryCovers traditional topics as well as new and advanced materialFeatures numerous full-color illustrations, exercises, and unsolved problemsSuitable for sophomores in mathematics, computer science, engineering, or physicsRigorous but accessibleAn online solutions manual is available (for teachers only).A Reader on Classical Islam
Par Francis Edward Peters. 1994
To enable the reader to shape, or perhaps reshape, an understanding of the Islamic tradition, F. E. Peters skillfully combines…
extensive passages from Islamic texts with a fascinating commentary of his own. In so doing, he presents a substantial body of literary evidence that will enable the reader to grasp the bases of Muslim faith and, more, to get some sense of the breadth and depth of Islamic religious culture as a whole. The voices recorded here are those of Muslims engaged in discourse with their God and with each other--historians, lawyers, mystics, and theologians, from the earliest Companions of the Prophet Muhammad down to Ibn Rushd or "Averroes" (d. 1198), al-Nawawi (d. 1278), and Ibn Khaldun (d. 1406). These religious seekers lived in what has been called the "classical" period in the development of Islam, the era when the exemplary works of law and spirituality were written, texts of such universally acknowledged importance that subsequent generations of Muslims gratefully understood themselves as heirs to an enormously broad and rich legacy of meditation on God's Word. "Islam" is a word that seems simple to understand. It means "submission," and, more specifically in the context where it first and most familiarly appears, "submission to the will of God." That context is the Quran, the Sacred Book of the Muslims, from which flow the patterns of belief and practice that today claim the spiritual allegiance of hundreds of millions around the globe. By drawing on the works of the great masters--Islam in its own words--Peters enriches our understanding of the community of "those who have submitted" and their imposing religious and political culture, which is becoming ever more important to the West.Software Supply Chain Security
Par Cassie Crossley. 2024
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability…
can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.With this book, you'll learn how to:Pinpoint the cybersecurity risks in each part of your organization's software supply chainIdentify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurementDesign initiatives and controls for each part of the supply chain using existing frameworks and referencesImplement secure development lifecycle, source code security, software build management, and software transparency practicesEvaluate third-party risk in your supply chainA History of Jewish-Muslim Relations: From the Origins to the Present Day
Par Meddeb Abdelwahab. 2014
The first encylopedic guide to the history of relations between Jews and Muslims around the worldThis is the first encyclopedic…
guide to the history of relations between Jews and Muslims around the world from the birth of Islam to today. Richly illustrated and beautifully produced, the book features more than 150 authoritative and accessible articles by an international team of leading experts in history, politics, literature, anthropology, and philosophy. Organized thematically and chronologically, this indispensable reference provides critical facts and balanced context for greater historical understanding and a more informed dialogue between Jews and Muslims.Part I covers the medieval period; Part II, the early modern period through the nineteenth century, in the Ottoman Empire, Africa, Asia, and Europe; Part III, the twentieth century, including the exile of Jews from the Muslim world, Jews and Muslims in Israel, and Jewish-Muslim politics; and Part IV, intersections between Jewish and Muslim origins, philosophy, scholarship, art, ritual, and beliefs. The main articles address major topics such as the Jews of Arabia at the origin of Islam; special profiles cover important individuals and places; and excerpts from primary sources provide contemporary views on historical events.Contributors include Mark R. Cohen, Alain Dieckhoff, Michael Laskier, Vera Moreen, Gordon D. Newby, Marina Rustow, Daniel Schroeter, Kirsten Schulze, Mark Tessler, John Tolan, Gilles Veinstein, and many more.Covers the history of relations between Jews and Muslims around the world from the birth of Islam to todayWritten by an international team of leading scholarsFeatures in-depth articles on social, political, and cultural historyIncludes profiles of important people (Eliyahu Capsali, Joseph Nasi, Mohammed V, Martin Buber, Anwar Sadat and Menachem Begin, Edward Said, Messali Hadj, Mahmoud Darwish) and places (Jerusalem, Alexandria, Baghdad)Presents passages from essential documents of each historical period, such as the Cairo Geniza, Al-Sira, and Judeo-Persian illuminated manuscriptsRichly illustrated with more than 250 images, including maps and color photographsIncludes extensive cross-references, bibliographies, and an indexLeisurely Islam: Negotiating Geography and Morality in Shi‘ite South Beirut (Princeton Studies in Muslim Politics #49)
Par Lara Deeb, Mona Harb. 2014
How the rise of leisure is changing contemporary LebanonSouth Beirut has recently become a vibrant leisure destination with a plethora…
of cafés and restaurants that cater to the young, fashionable, and pious. What effects have these establishments had on the moral norms, spatial practices, and urban experiences of this Lebanese community? From the diverse voices of young Shi'i Muslims searching for places to hang out, to the Hezbollah officials who want this media-savvy generation to be more politically involved, to the religious leaders worried that Lebanese youth are losing their moral compasses, Leisurely Islam provides a sophisticated and original look at leisure in the Lebanese capital.What makes a café morally appropriate? How do people negotiate morality in relation to different places? And under what circumstances might a pious Muslim go to a café that serves alcohol? Lara Deeb and Mona Harb highlight tensions and complexities exacerbated by the presence of multiple religious authorities, a fraught sectarian political context, class mobility, and a generation that takes religion for granted but wants to have fun. The authors elucidate the political, economic, religious, and social changes that have taken place since 2000, and examine leisure's influence on Lebanese sociopolitical and urban situations.Asserting that morality and geography cannot be fully understood in isolation from one another, Leisurely Islam offers a colorful new understanding of the most powerful community in Lebanon today.The NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.The Golden Ticket: P, NP, and the Search for the Impossible
Par Lance Fortnow. 2013
The computer science problem whose solution could transform life as we know itThe P-NP problem is the most important open…
problem in computer science, if not all of mathematics. Simply stated, it asks whether every problem whose solution can be quickly checked by computer can also be quickly solved by computer. The Golden Ticket provides a nontechnical introduction to P-NP, its rich history, and its algorithmic implications for everything we do with computers and beyond. Lance Fortnow traces the history and development of P-NP, giving examples from a variety of disciplines, including economics, physics, and biology. He explores problems that capture the full difficulty of the P-NP dilemma, from discovering the shortest route through all the rides at Disney World to finding large groups of friends on Facebook. The Golden Ticket explores what we truly can and cannot achieve computationally, describing the benefits and unexpected challenges of this compelling problem.The Logician and the Engineer: How George Boole and Claude Shannon Created the Information Age
Par Paul J. Nahin. 2012
How two pioneers of math and technology ushered in the computer revolutionBoolean algebra, also called Boolean logic, is at the…
heart of the electronic circuitry in everything we use—from our computers and cars, to home appliances. How did a system of mathematics established in the Victorian era become the basis for such incredible technological achievements a century later? In The Logician and the Engineer, Paul Nahin combines engaging problems and a colorful historical narrative to tell the remarkable story of how two men in different eras—mathematician and philosopher George Boole and electrical engineer and pioneering information theorist Claude Shannon—advanced Boolean logic and became founding fathers of the electronic communications age. Nahin takes readers from fundamental concepts to a deeper and more sophisticated understanding of modern digital machines, in order to explore computing and its possible limitations in the twenty-first century and beyond.This book offers a new approach to introductory scientific computing. It aims to make students comfortable using computers to do…
science, to provide them with the computational tools and knowledge they need throughout their college careers and into their professional careers, and to show how all the pieces can work together. Rubin Landau introduces the requisite mathematics and computer science in the course of realistic problems, from energy use to the building of skyscrapers to projectile motion with drag. He is attentive to how each discipline uses its own language to describe the same concepts and how computations are concrete instances of the abstract. Landau covers the basics of computation, numerical analysis, and programming from a computational science perspective. The first part of the printed book uses the problem-solving environment Maple as its context, with the same material covered on the accompanying CD as both Maple and Mathematica programs; the second part uses the compiled language Java, with equivalent materials in Fortran90 on the CD; and the final part presents an introduction to LaTeX replete with sample files. Providing the essentials of computing, with practical examples, A First Course in Scientific Computing adheres to the principle that science and engineering students learn computation best while sitting in front of a computer, book in hand, in trial-and-error mode. Not only is it an invaluable learning text and an essential reference for students of mathematics, engineering, physics, and other sciences, but it is also a consummate model for future textbooks in computational science and engineering courses. A broad spectrum of computing tools and examples that can be used throughout an academic career Practical computing aimed at solving realistic problems Both symbolic and numerical computations A multidisciplinary approach: science + math + computer science Maple and Java in the book itself; Mathematica, Fortran90, Maple and Java on the accompanying CD in an interactive workbook formatJihad in Islamic History: Doctrines and Practice
Par Michael Bonner. 2006
What is jihad? Does it mean violence, as many non-Muslims assume? Or does it mean peace, as some Muslims insist?…
Because jihad is closely associated with the early spread of Islam, today's debate about the origin and meaning of jihad is nothing less than a struggle over Islam itself. In Jihad in Islamic History, Michael Bonner provides the first study in English that focuses on the early history of jihad, shedding much-needed light on the most recent controversies over jihad. To some, jihad is the essence of radical Islamist ideology, a synonym for terrorism, and even proof of Islam's innate violence. To others, jihad means a peaceful, individual, and internal spiritual striving. Bonner, however, shows that those who argue that jihad means only violence or only peace are both wrong. Jihad is a complex set of doctrines and practices that have changed over time and continue to evolve today. The Quran's messages about fighting and jihad are inseparable from its requirements of generosity and care for the poor. Jihad has often been a constructive and creative force, the key to building new Islamic societies and states. Jihad has regulated relations between Muslims and non-Muslims, in peace as well as in war. And while today's "jihadists" are in some ways following the "classical" jihad tradition, they have in other ways completely broken with it. Written for general readers who want to understand jihad and its controversies, Jihad in Islamic History will also interest specialists because of its original arguments.On the Muslim Question (The Public Square #2)
Par Anne Norton. 2013
Why “the Muslim question” is really about the West and its own anxieties—not IslamIn the post-9/11 West, there is no…
shortage of strident voices telling us that Islam is a threat to the security, values, way of life, and even existence of the United States and Europe. For better or worse, "the Muslim question" has become the great question of our time. It is a question bound up with others--about freedom of speech, terror, violence, human rights, women's dress, and sexuality. Above all, it is tied to the possibility of democracy. In this fearless, original, and surprising book, Anne Norton demolishes the notion that there is a "clash of civilizations" between the West and Islam. What is really in question, she argues, is the West's commitment to its own ideals: to democracy and the Enlightenment trinity of liberty, equality, and fraternity. In the most fundamental sense, the Muslim question is about the values not of Islamic, but of Western, civilization.Moving between the United States and Europe, Norton provides a fresh perspective on iconic controversies, from the Danish cartoon of Muhammad to the murder of Theo van Gogh. She examines the arguments of a wide range of thinkers--from John Rawls to Slavoj Žižek. And she describes vivid everyday examples of ordinary Muslims and non-Muslims who have accepted each other and built a common life together. Ultimately, Norton provides a new vision of a richer and more diverse democratic life in the West, one that makes room for Muslims rather than scapegoating them for the West's own anxieties.