February New Computer Science books
Cloud Control Systems: Analysis, Design and Estimation
Cloud Control Systems: Analysis, Design and Estimation: QA76.585 .M355 2020
Author(s): Magdi S. Mahmoud, Yuanqing Xia
London : Academic Press 2020.
Cloud Control Systems: Analysis, Design and Estimation introduces readers to the basic definitions and various new developments in the growing field of cloud control systems (CCS). The book begins with an overview of cloud control systems (CCS) fundamentals, which will help beginners to better understand the depth and scope of the field. It then discusses current techniques and developments in CCS, including event-triggered cloud control, predictive cloud control, fault-tolerant and diagnosis cloud control, cloud estimation methods, and secure control/estimation under cyberattacks. This book benefits all researchers including professors, postgraduate students and engineers who are interested in modern control theory, robust control, multi-agents control. Offers insights into the innovative application of cloud computing principles to control and automation systems Provides an overview of cloud control systems (CCS) fundamentals and introduces current techniques and developments in CCS Investigates distributed denial of service attacks, false data injection attacks, resilient design under cyberattacks, and safety assurance under stealthy cyberattacks
Effective Cybersecurity: A Guide to Using Best Practices and Standards
Effective Cybersecurity: A Guide to Using Best Practices and Standards: QA76.9.A25 S686 2019
Author(s): William Stallings
Upper Saddle River, NJ : Addison-Wesley 
William Stallings' Effective Cybersecurity offers a comprehensive and unified explanation of the best practices and standards that represent proven, consensus techniques for implementing cybersecurity. Stallings draws on the immense work that has been collected in multiple key security documents, making this knowledge far more accessible than it has ever been before. Effective Cybersecurity is organized to align with the comprehensive Information Security Forum document The Standard of Good Practice for Information Security, but deepens, extends, and complements ISF's work with extensive insights from the ISO 27002 Code of Practice for Information Security Controls, the NIST Framework for Improving Critical Infrastructure Cybersecurity, COBIT 5 for Information Security, and a wide spectrum of standards and guidelines documents from ISO, ITU-T, NIST, Internet RFCs, other official sources, and the professional, academic, and industry literature. In a single expert source, current and aspiring cybersecurity practitioners will find comprehensive and usable practices for successfully implementing cybersecurity within any organization. Stallings covers: Security Planning: Developing approaches for managing and controlling the cybersecurity function; defining the requirements specific to a given IT environment; and developing policies and procedures for managing the security function Security Management: Implementing the controls to satisfy the defined security requirements Security Evaluation: Assuring that the security management function enables business continuity; monitoring, assessing, and improving the suite of cybersecurity controls. Beyond requiring a basic understanding of cryptographic terminology and applications, this book is self-contained: all technology areas are explained without requiring other reference material. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material. These include: clear learning objectives, keyword lists, and glossaries to QR codes linking to relevant standards documents and web resources.
Cracking the Digital Ceiling: Women in Computing around the World
Cracking the Digital Ceiling: Women in Computing around the World: QA76.9.W65 C7 2020
Author(s): Carol Frieze, Jeria L. Quesenberry
Cambridge, United Kingdom ; Cambridge University Press 2020.
Is computing just for men? Are men and women suited to different careers? This collection of global perspectives challenges these commonly held western views, perpetuated as explanations for women's low participation in computing. By providing an insider look at how different cultures worldwide impact the experiences of women in computing, the book introduces readers to theories and evidence that support the need to turn to environmental factors, rather than innate potential, to understand what determines women's participation in this growing field. This wakeup call to examine the obstacles and catalysts within various cultures and environments will help those interested in improving the situation understand where they might look to make changes that could impact women's participation in their classrooms, companies, and administrations. Computer scientists, STEM educators, students of all disciplines, professionals in the tech industry, leaders in gender equity, anthropologists, and policy makers will all benefit from reading this book.
Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technologies, and Regulations
Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technologies, and Regulations: TK5105.59 .S715 2020
Author(s): William Stallings
Boston : Addison-Wesley 
Organizations of all kinds are recognizing the crucial importance of protecting privacy. Their customers, employees, and other stakeholders demand it. Today, failures to safeguard privacy can destroy organizational reputations -- and even the organizations themselves. But implementing effective privacy protection is difficult, and there are few comprehensive resources for those tasked with doing so. In Information Privacy Engineering and Privacy by Design, renowned information technology author William Stallings brings together the comprehensive and practical guidance you need to succeed. Stallings shows how to apply today's consensus best practices and widely-accepted standards documents in your environment, leveraging policy, procedures, and technology to meet legal and regulatory requirements and protect everyone who depends on you. Like Stallings' other award-winning texts, this guide is designed to help readers quickly find the information and gain the mastery needed to implement effective privacy. Coverage includes: Planning for privacy: approaches for managing and controlling the privacy control function; how to define your IT environment's requirements; and how to develop appropriate policies and procedures for it Privacy threats: Understanding and identifying the full range of threats to privacy in information collection, storage, processing, access, and dissemination Information privacy technology: Satisfying the privacy requirements you've defined by using technical controls, privacy policies, employee awareness, acceptable use policies, and other techniques Legal and regulatory requirements: Understanding GDPR as well as the current spectrum of U.S. privacy regulations, with insight for mapping regulatory requirements to IT actions