• Computer security
      March 2010

      Assessing Information Security

      Strategies, Tactics, Logic and Framework

      by Andrew A. Vladimirov

      What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. The human factor Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Fight Cybercrime Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy. Leadership Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime. Strategy Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

    • Computer networking & communications

      Colorado

      by Carl Abbott, Stephen J. Leonard, Thomas J. Noel

      Since 1976, newcomers and natives alike have learned about the rich history of the magnificent place they call home from Colorado: A History of the Centennial State. In the fifth edition, coauthors Carl Abbott, Stephen J. Leonard, and Thomas J. Noel incorporate recent events, scholarship, and insights about the state in an accessible volume that general readers and students will enjoy. The new edition tells of conflicts, shifting alliances, and changing ways of life as Hispanic, European, and African American settlers flooded into a region that was already home to Native Americans. Providing a balanced treatment of the entire state’s history—from Grand Junction to Lamar and from Trinidad to Craig—the authors also reveal how Denver and its surrounding communities developed and gained influence. While continuing to elucidate the significant impact of mining, agriculture, manufacturing, and tourism on Colorado, the fifth edition broadens and focuses its coverage by consolidating material on Native Americans into one chapter and adding a new chapter on sports history. The authors also expand their discussion of the twentieth century with updated sections on the environment, economy, politics, and recent cultural conflicts. New illustrations, updated statistics, and an extensive bibliography including Internet resources enhance this edition.

    • Computer networking & communications

      Colorado Women

      by Beaton, Gail M.

      Worldwide rights available excluding English language rights for sale and distribution in Canada and the United States, including U.S. territories and possessions.

    • Computer networking & communications

      Gambling on Ore

      The Nature of Metal Mining in the United States, 1860-191

      by Kent Curtis

      Gambling on Ore examines the development of the western mining industry from the tumultuous and violent Gold Rush to the elevation of large-scale copper mining in the early twentieth century, using Montana as representative of mining developments in the broader US mining west. Employing abundant new historical evidence in key primary and secondary sources, Curtis tells the story of the inescapable relationship of mining to nature in the modern world as the United States moved from a primarily agricultural society to a mining nation in the second half of the nineteenth century.In Montana, legal issues and politics—such as unexpected consequences of federal mining law and the electrification of the United States—further complicated the mining industry’s already complex relationship to geology, while government policy, legal frameworks, dominant understandings of nature, and the exigencies of profit and production drove the industry in momentous and surprising directions. Despite its many uncertainties, mining became an important part of American culture and daily life.Gambling on Ore unpacks the tangled relationships between mining and the natural world that gave material possibility to the age of electricity. Metal mining has had a profound influence on the human ecology and the social relationships of North America through the twentieth century and throughout the world after World War II. Understanding how we forged these relationships is central to understanding the environmental history of the United States after 1850.

    • Computer networking & communications

      House on Lemon Street

      Japanese Pioneers & the American Dream

      by Mark Rawitsch

      In 1915, Jukichi and Ken Harada purchased a house on Lemon Street in Riverside, California. Close to their restaurant, church, and children's school, the house should have been a safe and healthy family home. Before the purchase, white neighbors objected because of the Haradas' Japanese ancestry, and the California Alien Land Law denied them real-estate ownership because they were not citizens. To bypass the law Mr. Harada bought the house in the names of his three youngest children, who were American-born citizens. Neighbors protested again, and the first Japanese American court test of the California Alien Land Law of 1913-The People of California v. Jukichi Harada-was the result. Bringing this little-known story to light, The House on Lemon Street details the Haradas' decision to fight for the American dream. Chronicling their experiences from their immigration to the United States through their legal battle over their home, their incarceration during World War II, and their lives after the war, this book tells the story of the family's participation in the struggle for human and civil rights, social justice, property and legal rights, and fair treatment of immigrants in the United States. The Harada family's quest for acceptance illuminates the deep underpinnings of anti-Asian animus, which set the stage for Executive Order 9066, and recognizes fundamental elements of our nation's anti-immigrant history that continue to shape the American story. It will be worthwhile for anyone interested in the Japanese American experience in the twentieth century, immigration history, public history, and law. This publication was made possible with the support of Naomi, Kathleen, Ken, and Paul Harada, who donated funds in memory of their father, Harold Shigetaka Harada, honoring his quest for justice and civil rights. Additional support for this publication was also provided, in part, by UCLA's Aratani Endowed Chair as well as Wallace T. Kido, Joel B. Klein, Elizabeth A. Uno, and Rosalind K. Uno.

    • Computer networking & communications

      Mercury and the Making of California

      Mining, Landscape, and Race, 1840-1890

      by Andrew Scott Johnston

      Mercury and the Making of California, Andrew Johnston’s multidisciplinary examination of the history and cultural landscapes of California’s mercury-mining industry, raises mercury to its rightful place alongside gold and silver in the development of the American West. Gold and silver could not be refined without mercury; therefore, its production and use were vital to securing power and wealth in the West. The first industrialized mining in California, mercury mining had its own particular organization, structure, and built environments. These were formed within the Spanish Empire, subsequently transformed by British imperial ambitions, and eventually manipulated by American bankers and investors. In California mercury mining also depended on a workforce differentiated by race and ethnicity. The landscapes of work and camp and the relations among the many groups involved in the industry—Mexicans, Chileans, Spanish, English, Irish, Cornish, American, and Chinese—form a crucial chapter in the complex history of race and ethnicity in the American West.This pioneering study explicates the mutual structuring of the built environments of the mercury-mining industry and the emergence of California’s ethnic communities. Combining rich documentary sources with a close examination of the existing physical landscape, Johnston explores both the detail of everyday work and life in the mines and the larger economic and social structures in which mercury mining was enmeshed, revealing the significance of mercury mining for Western history.

    • Computer networking & communications

      Passage to Wonderland

      Rephotographing Joseph Stimson's Views of the Cody Road to Yellowstone National Park, 1903 and 2008

      by Michael A. Amundson (Author) , Joseph Stimson (Photographer)

      In 1903 the Cody Road opened, leading travelers from Cody, Wyoming, to Yellowstone National Park. Cheyenne photographer J. E. Stimson traveled the route during its first week in existence, documenting the road for the state of Wyoming's contribution to the 1904 World's Fair. His images of now-famous landmarks like Cedar Mountain, the Shoshone River, the Holy City, Chimney Rock, Sylvan Pass, and Sylvan Lake are some of the earliest existing photographs of the route. In 2008, 105 years later, Michael Amundson traveled the same road, carefully duplicating Stimson's iconic original photographs. In Passage to Wonderland, these images are paired side by side and accompanied by a detailed explanation of the land and history depicted. Amundson examines the physical changes along "the most scenic fifty miles in America" and explores the cultural and natural history behind them. This careful analysis of the paired images make Passage to Wonderland more than a "then and now" photography book--it is a unique exploration of the interconnectedness between the Old West and the New West. It will be a wonderful companion for those touring the Cody Road as well as those armchair tourists who can follow the road on Google Earth using the provided GPS coordinates.

    • Computer networking & communications

      Santa Rita del Cobre

      by Christopher J Huggard , Terrence M Humble

      The Spanish, Mexicans, and Americans, successively, mined copper for more than 200 years in Santa Rita, New Mexico. Starting in 1799 after an Apache man led the Spanish to the native copper deposits, miners at the site followed industry developments in the nineteenth century to create a network of underground mines. In the early twentieth century these works became part of the Chino Copper Company's open-pit mining operations-operations that would overtake Santa Rita by 1970. In Santa Rita del Cobre, Huggard and Humble detail these developments with in-depth explanations of mining technology, and describe the effects on and consequences for the workers, the community, and the natural environment. Originally known as El Cobre, the mining-military camp of Santa Rita del Cobre ultimately became the company town of Santa Rita, which after World War II evolved into an independent community. From the town's beginnings to its demise, its mixed-heritage inhabitants from Mexico and United States cultivated rich family, educational, religious, social, and labor traditions. Extensive archival photographs, many taken by officials of the Kennecott Copper Corporation, accompany the text, providing an important visual and historical record of a town swallowed up by the industry that created it.

    • Computer networking & communications

      Season of Terror

      The Espinosas in Central Colorado, March-October 1863

      by Charles F. Price

      Season of Terror is the first book-length treatment of the little-known true story of the Espinosas—serial murderers with a mission to kill every Anglo in Civil War–era Colorado Territory—and the men who brought them down. For eight months during the spring and fall of 1863, brothers Felipe Nerio and José Vivián Espinosa and their young nephew, José Vincente, New Mexico–born Hispanos, killed and mutilated an estimated thirty-two victims before their rampage came to a bloody end. Their motives were obscure, although they were members of the Penitentes, a lay Catholic brotherhood devoted to self-torture in emulation of the sufferings of Christ, and some suppose they believed themselves inspired by the Virgin Mary to commit their slaughters. Until now, the story of their rampage has been recounted as lurid melodrama or ignored by academic historians. Featuring a fascinating array of frontier characters, Season of Terrorexposes this neglected truth about Colorado’s past and examines the ethnic, religious, political, military, and moral complexity of the controversy that began as a regional incident but eventually demanded the attention of President Lincoln.

    • Computer networking & communications

      Thomas F. Walsh

      by John Stewart (Author)

      Thomas F. Walsh tells the story of one of the West's wealthiest mining magnates - an Irish American prospector and lifelong philanthropist who struck it rich in Ouray County, Colorado.In the first complete biography of Thomas Walsh, John Stewart recounts the tycoon's life from his birth in 1850 and his beginnings as a millwright and carpenter in Ireland to his tenacious, often fruitless mining work in the Black Hills and Colorado, which finally led to his discovery of an extremely rich vein of gold ore in the Imogene Basin. Walsh's Camp Bird Mine yielded more than $20 million worth of gold and other minerals in twenty years, and the mine's 1902 sale to British investors made Walsh very wealthy.He achieved national prominence, living with his family in mansions in Colorado and Washington, D.C., and maintaining a rapport with Presidents McKinley, Theodore Roosevelt, and Taft, as well as King Leopold II of Belgium.Despite his fame and lavish lifestyle, Walsh is remembered as an unassuming and philanthropic man who treated his employees well. In addition to making many anonymous donations, he established the Walsh Library in Ouray and a library near his Irish birthplace, and helped establish a research fund for the study of radium and other rare western minerals at the Colorado School of Mines. Walsh gave his employees at the Camp Bird Mine top pay and lodged them in an alpine boardinghouse featuring porcelain basins, electric lighting, and excellent food.Stewart's engaging account explores the exceptional path of this Colorado mogul in detail, bringing Walsh and his time to life.

    • Computer networking & communications
      April 2008

      The Minimum You Need to Know About Service Oriented Architecture

      by Roland Hughes

      2008 Best Books Award Winner in the category Business: Computers/Technology/Internet - USA Book News. Service Oriented Architecture is all the rage these days. Dozens, if not hundreds of books are published on it, and more seem to show up every day. This book isn't awash with buzzwords and jargon. In truth, this book will probably be shunned by the SOA eltie. Rather than focus on the front end, this book focuses on the back end. That Heritage data silo/application where all of the other books just draw a box with "connect somehow" written on it. Most of them try to sell some expensive midleware along the way. Management can and should read the first five chapters in the book. These chapters aren't technical and may very well open their eyes. The remaining chapters are for those programmers given the "connect somehow" task. While OpenVMS is the Heritage platform of choice in this book and Ubuntu is used for the front end development, developers from other platforms should get a lot of ideas by reading this book.

    • Computer networking & communications
      January 1989

      Information Technology and the Conduct of Research

      The User's View

      by Panel on Information Technology and the Conduct of Research, National Academy of Sciences, National Academy of Engineering, Institute of Medicine

      Computers and telecommunications have revolutionized the processes of scientific research. How is this information technology being applied and what difficulties do scientists face in using information technology? How can these difficulties be overcome? Information Technology and the Conduct of Research answers these questions and presents a variety of helpful examples. The recommendations address the problems scientists experience in trying to gain the most benefit from information technology in scientific, engineering, and clinical research.

    • Computer networking & communications
      January 1987

      Mental Models in Human-Computer Interaction

      Research Issues About What the User of Software Knows

      by Committee on Human Factors, National Research Council

      Special copy

    • Computer networking & communications
      February 1992

      Keeping the U.S. Computer Industry Competitive

      Systems Integration

      by Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council

      Systems integration--the enterprise-wide integration of computer applications--offers an enormous opportunity for U.S. firms to capitalize on their strengths in such areas as complex software, networking, and management. In this book, industry leaders, university researchers, and government policymakers discuss what systems integration is, its importance and prospects for growth, why it is expected to define the characteristics of computerization for decades to come, and why the United States is perceived to have a strong competitive advantage.

    • Computer networking & communications
      January 1994

      Realizing the Information Future

      The Internet and Beyond

      by NRENAISSANCE Committee, National Research Council

      The potential impact of the information superhighway--what it will mean to daily work, shopping, and entertainment--is of concern to nearly everyone. In the rush to put the world on-line, special issues have emerged for researchers, educators and students, and library specialists. At the same time, the research and education communities have a valuable head start when it comes to understanding computer communications networks, particularly Internet. With its roots in the research community, the Internet computer network now links tens of millions of people and extends well into the commercial world. Realizing the Information Future is written by key players in the development of Internet and other data networks. The volume highlights what we can learn from Internet and how the research, education, and library communities can take full advantage of the information highway's promised reach through time and space. This book presents a vision for the proposed national information infrastructure (NII): an open data network sending information services of all kinds, from suppliers of all kinds, to customers of all kinds, across network providers of all kinds. Realizing the Information Future examines deployment issues for the NII in light of the proposed system architecture, with specific discussion of the needs of the research and education communities. What is the role of the "institution" when everyone is on-line in their homes and offices? What are the consequences when citizens can easily access legal, medical, educational, and government services information from a single system? These and many other important questions are explored. The committee also looks at the development of principles to address the potential for abuse and misuse of the information highway, covering Equitable and affordable access to the network. Reasonable approaches to controlling the rising tide of electronic information. Rights and responsibilities relating to freedom of expression, intellectual property, individual privacy, and data security. Realizing the Information Future includes a wide-ranging discussion of costs, pricing, and federal funding for network development and a discussion of the federal role in making the best technical choices to ensure that the expected social and economic benefits of the NII are realized. The time for the research and education communities to have their say about the information highway is before the ribbon is cut. Realizing the Information Future provides a timely, readable, and comprehensive exploration of key issues--important to computer scientists and engineers, researchers, librarians and their administrators, educators, and individuals interested in the shape of the information network that will soon link us all.

    • Computer networking & communications
      December 1994

      Virtual Reality

      Scientific and Technological Challenges

      by Nathaniel I. Durlach and Anne S. Mavor, Editors; Committee on Virtual Reality Research and Development, National Research Council

      Despite widespread interest in virtual reality, research and development efforts in synthetic environments (SE)--the field encompassing virtual environments, teleoperation, and hybrids--have remained fragmented. Virtual Reality is the first integrated treatment of the topic, presenting current knowledge along with thought-provoking vignettes about a future where SE is commonplace. This volume discusses all aspects of creating a system that will allow human operators to see, hear, smell, taste, move about, give commands, respond to conditions, and manipulate objects effectively in a real or virtual environment. The committee of computer scientists, engineers, and psychologists on the leading edge of SE development explores the potential applications of SE in the areas of manufacturing, medicine, education, training, scientific visualization, and teleoperation in hazardous environments. The committee also offers recommendations for development of improved SE technology, needed studies of human behavior and evaluation of SE systems, and government policy and infrastructure.

    • Computer networking & communications
      January 1994

      Research Recommendations to Facilitate Distributed Work

      by Technology and Telecommunications: Issues and Impacts Committee, National Research Council

      This book sets out technological research topics designed to facilitate and expand distributed work--including telecommuting, working while mobile, and working in geographically distributed teams. The book's recommendations for computing and communications infrastructure center on the provision and use of bandwidth--or the speed of communications. Concurrent applications research should be focused on ease of use and interoperability of the multitude of devices and programs that currently are needed to engage in distributed work.

    • Computer networking & communications
      May 1995

      Keeping the U.S. Computer and Communications Industry Competitive

      Convergence of Computing, Communications, and Entertainment

      by Computer Science and Technology Board, National Research Council

      Interactive multimedia and information infrastructure receive a lot of attention in the press, but what do they really mean for society? What are the most significant and enduring innovations? What does the convergence of digitally based technologies mean for U.S. businesses and consumers? This book presents an overview of the exciting but much-hyped phenomenon of digital convergence.

    • Computer networking & communications
      January 1994

      Rights and Responsibilities of Participants in Networked Communities

      by Dorothy E. Denning and Herbert S. Lin, Editors; Steering Committee on Rights and Responsibilities of Participants in Networked Communities, National Research Council

      This book describes a number of social and legal issues as they relate to various members of electronically networked communities. After a brief introduction to relevant legal precedents and to the manner in which societies develop norms for social behavior, the book explores right and responsibilities related to free speech, vandalism, property interests, and privacy.

    • Computer networking & communications
      June 1995

      Revolution in the U.S. Information Infrastructure

      by National Academy of Engineering

      While societies have always had information infrastructures, the power and reach of today's information technologies offer opportunities to transform work and family lives in an unprecedented fashion. This volume, a collection of six papers presented at the 1994 National Academy of Engineering Meeting Technical Session, presents a range of views on the subject of the revolution in the U.S. information infrastructure. The papers cover a variety of current issues including an overview of the technological developments driving the evolution of information infrastructures and where they will lead; the development of the Internet, particularly the government's role in its evolution; the impact of regulatory reform and antitrust enforcement on the telecommunications revolution; and perspectives from the computer, wireless, and satellite communications industries.

    Subscribe to our newsletter