Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a s...
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do co...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
This book focuses on nuclear engineering education in the post-Fukushima era. It was edited by the organizers of the summer school held in August 2011 in University of California, Berkeley, as part of a collaborative program between the University of Tokyo and UC Berkeley. Motivated by the particular relevance and importance of social-scientific ap...
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Inte...
Welcome to InnerSource, the powerful movement for developing open source software within the walls of a single organization, where the "openness" of a project extends across teams inside the company. In this report, O'Reilly editor and author Andy Oram takes you inside InnerSource, first by reviewing the principles that make open sou...
Dynamic Management Views (DMVs) are a significant and valuable addition to the DBA's troubleshooting armory, laying bare previously unavailable information regarding the under-the-covers activity of your database sessions and transactions.
Why, then, aren't all DBAs using them? Why do many DBAs continue to ignore them in favour of &quo...
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
The Angular 2+ Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
The processes for gathering, organizing, analyzing, and ultimately infusing AI throughout your organization can be thought of as a ladder. A ladder helps you climb far higher than you could go on your own by turning an impossible leap into a series of steps. Knowing what the ladder looks like helps you evaluate your organization's readiness fo...
So you're a manager, or at least you want to be, and you're looking for a good roadmap to help you prepare. If you want to be the kind of manager people really admire, this ebook is a good place to start. Instead of tactics and solutions, author Robert Hoekman, Jr. provides you with a belief system - an approach to solutions that you can ...
This open book describes and reviews the development of the quality control mechanisms and methodologies associated with IEA's extensive program of educational research. A group of renowned international researchers, directly involved in the design and execution of IEA's international large-scale assessments (ILSAs), describe the operatio...
Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when y...
With Kubernetes came many new concepts, particularly around networking and traffic management. Alongside these new concepts were entirely new classes of tools, designed for ephemeral, containerized, and distributed application deployments. In particular, Ingress controllers and service meshes did not exist prior to the Kubernetes era. Nor were Laye...