Muslims in a Post-9/11 America : A Survey of Attitudes and Beliefs and Their Implications for U.S. National Security Policy
PDF
Muslims in a Post-9/11 America

Muslims in a Post-9/11 America examines how public fears about Muslims in the United States compare with the reality of American Muslims' attitudes on a range of relevant issues. While most research on Muslim Americans focuses on Arab Muslims, a quarter of the Muslim American population, Rachel Gillum includes perspectives of Muslims from various ethnic and national communities—from African Americans to those of Pakistani, Iranian, o...

Network Security Through Data Analysis: Building Situational Awareness
PDF
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collec...

Web Applications (Hacking Exposed)
PDF
Web Applications (Hacking Exposed)

There is an unofficial time cycle called an ohnosecond, which is the amount of time between when you realize you left your keys in the car, and when the car door locks. While its frustrating paying the locksmith $100.00 to open the car door, it is also exasperating to the person paying the $100.00 that a good locksmith can open the car door in under a minute. While a car door is a entrance to one's automobile, web servers are portals...

Innovating in a Secret World : The Future of National Security and Global Leadership
PDF
Innovating in a Secret World

“Night-vision scopes, speech-to-text algorithms, and ultra-quiet helicopters are just some of the examples of technologies critical to our national security that are discussed in this book. As the rate of innovation of commercial ventures outpaces government-funded classified R&D, we need to ask some hard questions. This book provides a fascinating and provocative perspective that is grounded in rigorous research and deep industr...

From Russia with Code: Programming Migrations in Post-Soviet Times
PDF
From Russia with Code: Programming Migrations in Post-Soviet Times

“From Russia with Code is a deeply informative book about the diaspora of talented Russian computer scientists who now are working in other countries: the United States, Israel, Germany, and elsewhere. It reveals the interaction between Russian computer culture and that of other countries. But it is much more than that: it tells us that computer science is not a single thing, but a skill that blossoms differently in different environ...

Privacy as Trust: Information Privacy for an Information Age
PDF
Privacy as Trust: Information Privacy for an Information Age

'There is, at present, a great deal of sophisticated sociological work on individual expectations of privacy, and a parallel literature by legal academics which explores the limits and possibilities of data protection policy. Ari Ezra Waldman's brings together these two literatures with a strikingly original synthesis of what social science should mean for law, and how legal disputes can inform the research agenda of sociologists, co...

Kidnap for Ransom: Resolving the Unthinkable
PDF
Kidnap for Ransom: Resolving the Unthinkable

I found this book to be well written and extremely informative. Security and crisis management practitioners will find this reference source to be of immediate value in planning, response, and resolution efforts. Richard Wright provides a foundation to kidnapping and moves into preparations to fight against this crime and how to handle an incident. There are plenty of examples of real situations and advice on how to handle issues. Ri...

Take Control of Your Online Privacy, 4th Edition
PDF
Take Control of Your Online Privacy, 4th Edition

Nowadays, it can be difficult to complete ordinary activities without placing your personal data online, but having your data online puts you at risk for theft, embarrassment, and all manner of trouble. In this book, Joe Kissell helps you to develop a sensible online privacy strategy, customized for your needs. Whether you have a Mac or PC, iOS or Android device, set-top box, or some other network-enabled gadget, you'll find practica...