Last Friday I bought interesting book about security in very good price: three digital formats (epub, mobi, pdf) for 0.00 USD. Delivered from aPress store to my computer.
An I was very happy. But just only for one hour. I twitted about my hapiness and got message from aPress {TWITTER} that this is not the and and I can extend my hapiness… buying more book and still spending 0.00 USD. I cannot keep this information just for my (it’s not under NDA) especially that book came form different sections of ICT world.
All books are a little connected with thin-security line, but topics are different. This series called ApressOpen and full list available here.
And finally I ordered those books:
TouchDevelop 3rd Edition
R. Nigel Horspool, Nikolai Tillmann With all the people in the world who have only access to a smartphone but not a PC or a keyboard, creating a programming environment for developing in that environment became a reality with TouchDevelop from Microsoft Research. This book is meant to be a handy reference to this unique programming environment.
Managing Risk and Information Security
Malcolm Harkins This ApressOpen book describes the changing risk environment and why a fresh approach to information security is needed.The book discusses business risk from a broad perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions.
Intel® Xeon Phi™ Coprocessor Architecture and Tools
Rezaur Rahman IntelXeon Phi™ Coprocessor Architecture and Tools CoverIntel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in technical computing applications.
Intel® Trusted Execution Technology for Server Platforms
William Futral, James Greene This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations and guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that can be used to customize the server’s boot process to fit the datacenter’s requirements.
Some informations about books:
Touch Develop:
ISBN13: 978-1-4302-6136-0 | 270 Full Color Pages
User Level: Beginner to Advanced | Publication Date: June 1, 2013
Managing Risk and Information Security
ISBN13: 978-1-4302-5113-2 | 152 Pages
User Level: Beginner to Advanced | Publication Date: December 25, 2012
Intel® Xeon Phi™ Coprocessor Architecture and Tools
ISBN13: 978-1-4302-5926-8 | 232 Pages
User Level: Intermediate to Advanced | Publication Date: September 14, 2013
Intel® Trusted Execution Technology for Server Platforms
ISBN13: 978-1-4302-6148-3 | 156 Pages
User Level: Beginner to Advanced | Publication Date: September 28, 2013