Topic: Reference

The InfoSec Handbook

The InfoSec Handbook

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while...
0 like counts
416 pages
2014-08-30 Published
The Science-Music Borderlands

The Science-Music Borderlands

Interdisciplinary essays on music psychology that integrate scientific, humanistic, and artistic ways of knowing in transformative ways. Researchers using scientific methods and approaches to advance our understanding of music and...
0 like counts
408 pages
2023-05-02 Published
The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of...
0 like counts
436 pages
2014-01-27 Published
Principles of Knowledge Auditing

Principles of Knowledge Auditing

A comprehensive theoretical and practical guide to the operating principles of knowledge auditing, illustrated with numerous case studies. A knowledge audit provides an “at a glance” view of an organization's...
0 like counts
392 pages
2023-05-02 Published
Undue Hate

Undue Hate

How to understand the mistakes we make about those on the other side of the political spectrum—and how they drive the affective polarization that is tearing us apart. It's well...
0 like counts
200 pages
2023-05-16 Published
Cryptographic City

Cryptographic City

Cryptography's essential role in the functioning of the city, viewed against the backdrop of modern digital life. Cryptography is not new to the city; in fact, it is essential to...
0 like counts
280 pages
2023-05-16 Published
Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers,...
0 like counts
292 pages
2014-08-09 Published
A Practical Guide to TPM 2.0

A Practical Guide to TPM 2.0

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their...
0 like counts
419 pages
2015-01-24 Published
Just in Time

Just in Time

Literature and neuroscience come together to illuminate the human experience of beauty, which unfolds in time. How does beauty exist in time? This is Gabrielle Starr's central concern in Just in...
0 like counts
256 pages
2023-06-06 Published
Picture Research

Picture Research

An intimate foray into the invisible work that made it possible for pictures to circulate in print and online from the 1830s to the 2010s. Picture Research focuses on how pictures...
0 like counts
264 pages
2023-06-06 Published
Balkan Cyberia

Balkan Cyberia

How Bulgaria transformed the computer industry behind the Iron Curtain—and the consequences of that transformation for a society that dreamt of a brighter future. Bulgaria in 1963 was a communist...
0 like counts
424 pages
2023-06-13 Published
Context Changes Everything

Context Changes Everything

From the influential author of Dynamics in Action, how the concepts of constraints provide a way to rethink relationships, opening the way to intentional, meaningful causation. Grounding her work in the...
0 like counts
280 pages
2023-06-20 Published