ТОП просматриваемых книг сайта:
Компьютеры: прочее
Различные книги в жанре Компьютеры: прочее, доступные для чтения и скачиванияАннотация
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Understand blockchain and transaction technologies Set up and run cryptocurrency accounts Build information about specific addresses Access raw data on blockchain ledgers Identify users of cryptocurrencies Extracting cryptocurrency data from live and imaged computers Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.
Аннотация
Die Bioinformatik ist fur die Weiterentwicklung der modernen Biowissenschaften von herausragender Bedeutung. In Grundzugen wird sie Teil einer jeden Ausbildung zum Biologen oder Biochemiker werden. Obwohl die Zahl der angebotenen Lehrveranstaltungen rapide zunimmt, gibt es bisher auf dem deutschsprachigen Markt noch kein Lehrbuch zu dieser Thematik. Das vorliegende Werk schlie?t diese Lucke. Reich bebildert und mit relativ wenig mathematischem Formelaufwand werden die Grundlagen der Bioinformatik gut verstandlich aufbereitet. Die Themenauswahl ist dabei auf die Bedurfnisse der experimentell tatigen Biochemiker, Biologen und Mediziner abgestimmt. Auf die wichtigsten Hilfsmittel, die das Internet kostenlos bietet, wird ausfuhrlich eingegangen. Die Inhalte werden in der Abfolge Sequenz – Struktur – Funktion entwickelt: ? Sequenzdatenbanken ? Genomprojekte ? Proteinorientierte Datenbanken ? Techniken des eukaryontischen Genomassembly ? Strukturdatenbanken ? Expressionsanalyse mit DNA Chips ? Proteomics ? Phylogenie und Sequenz ? DNA Computing Die Bioinformatik betrifft die tagliche Arbeit eines jeden Biowissenschaftlers. Es sollte sich daher jeder mit den grundlegenden Ansatzen vertraut machen.
Аннотация
In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text will make a major impact on biological research and, in turn, on progress in biomedicine. We are all in their debt. —Eric Lander from the Foreword Reviews from the First Edition «…provides a broad overview of the basic tools for sequence analysis … For biologists approaching this subject for the first time, it will be a very useful handbook to keep on the shelf after the first reading, close to the computer.» —Nature Structural Biology «…should be in the personal library of any biologist who uses the Internet for the analysis of DNA and protein sequence data.» —Science «…a wonderful primer designed to navigate the novice through the intricacies of in scripto analysis … The accomplished gene searcher will also find this book a useful addition to their library … an excellent reference to the principles of bioinformatics.» —Trends in Biochemical Sciences This new edition of the highly successful Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins provides a sound foundation of basic concepts, with practical discussions and comparisons of both computational tools and databases relevant to biological research. Equipping biologists with the modern tools necessary to solve practical problems in sequence data analysis, the Second Edition covers the broad spectrum of topics in bioinformatics, ranging from Internet concepts to predictive algorithms used on sequence, structure, and expression data. With chapters written by experts in the field, this up-to-date reference thoroughly covers vital concepts and is appropriate for both the novice and the experienced practitioner. Written in clear, simple language, the book is accessible to users without an advanced mathematical or computer science background. This new edition includes: All new end-of-chapter Web resources, bibliographies, and problem sets Accompanying Web site containing the answers to the problems, as well as links to relevant Web resources New coverage of comparative genomics, large-scale genome analysis, sequence assembly, and expressed sequence tags A glossary of commonly used terms in bioinformatics and genomics Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Second Edition is essential reading for researchers, instructors, and students of all levels in molecular biology and bioinformatics, as well as for investigators involved in genomics, positional cloning, clinical research, and computational biology.
Аннотация
A review of the interdisciplinary field of synthetic biology, from genome design to spatial engineering Written by an international panel of experts, Synthetic Biology draws from various areas of research in biology and engineering and explores the current applications to provide an authoritative overview of this burgeoning field. The text reviews the synthesis of DNA and genome engineering and offers a discussion of the parts and devices that control protein expression and activity. The authors include information on the devices that support spatial engineering, RNA switches and explore the early applications of synthetic biology in protein synthesis, generation of pathway libraries, and immunotherapy. Filled with the most recent research, compelling discussions, and unique perspectives, Synthetic Biology offers an important resource for understanding how this new branch of science can improve on applications for industry or biological research. Advanced Biotechnology Biotechnology is a broad, interdisciplinary field of science, combining biological sciences and relevant engineering disciplines, that is becoming increasingly important as it benefits the environment and society. Recent years have seen substantial advances in all areas of biotechnology, resulting in the emergence of brand new fields. To reflect this progress, Sang Yup Lee (KAIST, South Korea), Jens Nielsen (Chalmers University, Sweden), and Gregory Stephanopoulos (MIT, USA) have joined forces as the editors of a new Wiley-VCH book series. Advanced Biotechnology will cover all pertinent aspects of the field and each volume will be prepared by eminent scientists who are experts on the topic in question.
Аннотация
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book adopts the new approach to preventing serious incidents rather than minimal compliance with regulations. It takes you step-by-simple-step to show how accidents can be avoided with little effort and money, allowing you to reap the rewards such an injury-free culture brings: higher worker morale, better product quality, and maximum productivity. Plus the inner satisfaction of reaching a goal that is worth striving for, namely zero accidents.
Аннотация
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Аннотация
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.
Аннотация
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work. Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer «if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time». This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. Internet Security: * Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols – the nuts and bolts of creating a secure network * Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions) * Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents * Authored by a recognised expert in security Internet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems.
Аннотация
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process. Essential for designers building large-scale systems who want best practice solutions to typical security problems Real world case studies illustrate how to use the patterns in specific domains For more information visit www.securitypatterns.org
Аннотация
This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them Based on real-world situations taken from the author's experiences of tracking coding mistakes at major financial institutions Covers SQL injection attacks, cross-site scripting, data manipulation in order to bypass authorization, and other attacks that work because of missing pieces of code Shows developers how to change their mindset from Web site construction to Web site destruction in order to find dangerous code