The Quarantine Files


Book Description

The Quarantine Files: 10 short stories of the Covid 19 lockdown, is a work of fiction by the author M Anzar. It tells 10 fantastic and unknown episodes of the Coronavirus shutdown. These stories cover vivid genres. They provide a soul-stirring experience and a blend of emotions to the reader.




Combating Spyware in the Enterprise


Book Description

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.* A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors




Configuring Symantec AntiVirus Enterprise Edition


Book Description

This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications. Configuring Symantec AntiVirus Enterprise Edition contains step-by-step instructions on how to Design, implement and leverage the Symantec Suite of products in the enterprise. - First book published on market leading product and fast-growing certification. Despite the popularity of Symantec's products and Symantec Product Specialist certifications, there are no other books published or announced. - Less expensive substitute for costly on-sight training. Symantec offers week-long courses on this same product for approximately $2,500. This book covers essentially the same content at a fraction of the price, and will be an attractive alternative for network engineers and administrators. - Free practice exam from [email protected]. Syngress will offer a free Symantec Product Specialist Certification practice exam from syngress.com. Comparable exams are priced from $39.95 to $59.95.




The Enterprise Big Data Lake


Book Description

The data lake is a daring new approach for harnessing the power of big data technology and providing convenient self-service capabilities. But is it right for your company? This book is based on discussions with practitioners and executives from more than a hundred organizations, ranging from data-driven companies such as Google, LinkedIn, and Facebook, to governments and traditional corporate enterprises. You’ll learn what a data lake is, why enterprises need one, and how to build one successfully with the best practices in this book. Alex Gorelik, CTO and founder of Waterline Data, explains why old systems and processes can no longer support data needs in the enterprise. Then, in a collection of essays about data lake implementation, you’ll examine data lake initiatives, analytic projects, experiences, and best practices from data experts working in various industries. Get a succinct introduction to data warehousing, big data, and data science Learn various paths enterprises take to build a data lake Explore how to build a self-service model and best practices for providing analysts access to the data Use different methods for architecting your data lake Discover ways to implement a data lake from experts in different industries




The Loners


Book Description

It was just another ordinary day at McKinley High—until a massive explosion devastated the school. When loner David Thorpe tried to help his English teacher to safety, the teacher convulsed and died right in front of him. And that was just the beginning. A year later, McKinley has descended into chaos. All the students are infected with a virus that makes them deadly to adults. The school is under military quarantine. The teachers are gone. Violent gangs have formed based on high school social cliques. Without a gang, you're as good as dead. And David has no gang. It's just him and his little brother, Will, against the whole school. In this frighteningly dark and captivating novel, Lex Thomas locks readers inside a school where kids don't fight to be popular, they fight to stay alive.




Data Science for COVID-19


Book Description

Data Science for COVID-19, Volume 2: Societal and Medical Perspectives presents the most current and leading-edge research into the applications of a variety of data science techniques for the detection, mitigation, treatment and elimination of the COVID-19 virus. At this point, Cognitive Data Science is the most powerful tool for researchers to fight COVID-19. Thanks to instant data-analysis and predictive techniques, including Artificial Intelligence, Machine Learning, Deep Learning, Data Mining, and computational modeling for processing large amounts of data, recognizing patterns, modeling new techniques, and improving both research and treatment outcomes is now possible. - Provides a leading-edge survey of Data Science techniques and methods for research, mitigation and the treatment of the COVID-19 virus - Integrates various Data Science techniques to provide a resource for COVID-19 researchers and clinicians around the world, including the wide variety of impacts the virus is having on societies and medical practice - Presents insights into innovative, data-oriented modeling and predictive techniques from COVID-19 researchers around the world, including geoprocessing and tracking, lab data analysis, and theoretical views on a variety of technical applications - Includes real-world feedback and user experiences from physicians and medical staff from around the world for medical treatment perspectives, public safety policies and impacts, sociological and psychological perspectives, the effects of COVID-19 in agriculture, economies, and education, and insights on future pandemics




MCTS: Microsoft Exchange Server 2007 Configuration Study Guide


Book Description

This comprehensive book prepares you for Microsoft's new certification, MCTS: Microsoft Exchange Server 2007. Exam 70-236 serves as both the single exam requirement for achieving the MCTS designation as well as the entry exam for the MCITP certification for Exchange Server 2007. Inside, you'll find the practical and in-depth instruction you need, including full coverage of all exam objectives, practical hands-on exercises, real-world scenarios, challenging review questions, and more. The book includes a CD with advanced testing software and electronic flashcards. For Instructors: Teaching supplements are available for this title.







Exchange Server 2010 Administration


Book Description

A soup-to-nuts guide for messaging administrators Exchange Server is the world’s leading e-mail server software. Windows 7 and Server 2008 R2 have made changes that messaging administrators need to know and understand in their daily work with Exchange Server. This Sybex guide focuses on the skills, concepts, technologies, and potential pitfalls that admins in the trenches need to understand. It also provides the information they need to earn MCITP certification. Updates in Exchange Server, the world’s leading e-mail server software, require messaging administrators to update their knowledge in order to provide the best possible e-mail solutions Highly focused and comprehensive, this guide teaches you to design a highly available e-mail messaging server, install and configure Exchange Server 2010, work with recipients, groups and mailboxes, configure public folders, secure Exchange, and more CD includesvideo walkthroughs of more difficult tasks, practice exams, and electronic flashcards. Exchange Server 2010 Administration offers real-world knowledge that messaging admins need every day and helps prepare candidates for the MCITP certification exam. CD-ROM/DVD and other supplementary materials are not included as part of the e-book file, but are available for download after purchase.




Data protection in the context of covid-19. A short (hi)story of tracing applications


Book Description

The volume presents the results of a research project (named “Legafight”) funded by the Luxembourg Fond National de la Recherche in order to verify if and how digital tracing applications could be implemented in the Grand-Duchy in order to counter and abate the Covid-19 pandemic. This inevitably brought to a deep comparative overview of the various existing various models, starting from that of the European Union and those put into practice by Belgium, France, Germany and Italy, with attention also to some Anglo-Saxon approaches (the UK and Australia). Not surprisingly the main issue which had to be tackled was that of the protection of the personal data collected through the tracing applications, their use by public health authorities and the trust laid in tracing procedures by citizens. Over the last 18 months tracing apps have registered a rise, a fall, and a sudden rebirth as mediums devoted not so much to collect data, but rather to distribute real time information which should allow informed decisions and be used as repositories of health certifications.