Tuesday, December 31, 2013

Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism


CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: February 15, 2014 Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism

CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: February 15, 2014
Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism

A book edited by
 Dr. Maurice Dawson (Alabama A&M University, USA)
Dr. Marwan Omar (Nawroz University, Iraq)

To be published by IGI Global: http://bit.ly/1emzhn0


The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age.


Introduction
This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective.

Objective of the Book
This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems.

Target Audience
The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense.

Recommended topics include, but are not limited to, the following:
·         Network and Mobile Security
·         Virtual Words for Terrorism Training Grounds
·         Attacking Health Care Devices
·         Automobiles Access Points
·         Cyber Terrorism
·         Cyber Crime
·         Software Assurance
·         Exploiting Code Vulnerabilities
·         Future Predictions of Cyber Crime
·         Department of Defense Information Assurance Controls
·         Reverse Engineering
·         Vulnerabilities in Mixed & Augmented Reality
·         Vulnerabilities in Google Glass
·         Systems of Systems Attacks
·         Unmanned Systems Exploitations
·         Certification and Accreditation
·         Cryptosystems

We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.

Submission Procedure
Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the Information Science Reference (formerly Idea Group Reference), Medical Information Science Reference, Business Science Reference, and Engineering Science Reference imprints. For additional information regarding the publisher, please visit www.igi-global.com. This book is anticipated to be released in 2014.

Important Dates
1st Proposal Submission Deadline:       February 15, 2014 
2nd Proposal Submission Deadline:      March 15, 2014 
Last Call for Proposals:                           April 15, 2014 
Full chapter Submission:                         June 15, 2014 
Review Process:                                        June 15, 2014 –July 30, 2014 
Review Results to Authors:                    August 15, 2014 
Revised Chapter Submission:                 September 15, 2014 
Final Acceptance Notifications:              September 30, 2014 
Submission of Final Chapters:               October 15, 2014 
Final Deadline:                                           November 30, 2014

Inquiries can be forwarded to
Inquires can be forwarded to electronically (Word document): 
Dr. Maurice Dawson 
Department of Management and Marketing 
College of Business and Public Affairs 
Alabama A&M University 
Tel.: +1-256-372-4801 
Primary Email: 
maurice.e.dawson@gmail.com
Secondary Email: 
maurice.dawson@aamu.edu

25 Free Resources To Learn Java Programming Language Online

25 Free Resources To Learn Java Programming Language Online [Original Post Found Here]

25+ Free Resources To Learn Java Programming Language Online   
 
Videos, cheat sheets, ebooks, websites, this ultimate resource list have everything that you want to learn about Java!  
Rate this news:   (1 Votes)
Saturday, September 07, 2013:  Want to learn Java programming for free? Well, you have come to the perfect place. We bring to you 28 free and high quality java learning resources that includes e-books, websites, cheat-sheets and video channels to learn the Java online for free. So make your pick and get started!
Java, java programming, java programming language, Java programming cheat sheet, Java programming e-books, Java tutorial, Java resources




e-Books

Official Java EE Tutorial: Official Java Tutorial from Oracle In PDF Format

Official Java Tutorial by Oracle (Sun): This is the official online Java tutorial of book from Addison-Wesley

Think Java: An introduction to java programming for beginners.

Introduction to Programming Using JavaOnline version of book "Introduction to Programming Using Java".

OSGI In Practice: Free PDF Book on Java OSGI Platform development for advanced/expert developers.

Core Servlets and JavaServer: ITs Free Online Version of Core Servlets and JavaServer Pages book

Java Application Development on Linux by Carl Albing and Michael Schwarz: A handy guide for Java development on Linux platform.

Inside the Java Virtual Machine: Free chapters of the a really good book "Inside the Java Virtual Machine" by Bill Venners.

Data Structures and Algorithms with Object-Oriented Design Patterns in Java: A good online book for mid level experienced Java developer to understand design pattern using Java language.

Thinking In Java: Online free Version of popular book Thinking In Java by Bruce Eckel.

Free Websites To Learn Java

Java SE Specification: This contains the Java Language and Virtual Machine Specifications for deeper understanding for Java language.

Java Lessons: Java and JSP Tutorials with Examples.

Java Generics FAQs: A really good question answer format online tutorial for common Java Generics related concepts.

Java Programming FAQs and Tutorials: This site contains many specialized and general Java Programming Topics in question answer format.

Cafeaulait: Single web page tutorial on Java by Elliotte Rusty Harold

Core Servlets Java Tutorials: A very good resource for experienced java developers.

Java Practices: This site provides presentations of Java practices, tasks, and designs, and a huge set of syntax-highlighted code examples.

Programming Notes: Simple java tutorials for beginners.

Top Cheat Sheets For Java

Java API DocsThe best cheat sheet, that I always prefer is Java official API documentation. It handy to easily browse through various classes and their documentation.

Cheatsheet by Princeton University: Summary of most commonly-used Java language features in one page.

Cheatsheet by mindprod.comOne page simple online handy cheat sheet.

DZone Cheatsheets: Best Resource for Java and related technology cheat sheets and good articles.

Quick Reference By Digilife: Contains simple quick notes to use variety of java programming constructs.

Java Reference (By Dream In Code):A simple cheat sheet for java beginners.

Free Video Tutorials

Tutorials for Java Development with Eclipse

Video Tutorials By Java9s

Java Tutorial for Beginners

Java Videos and Screencasts

Courtesy: Sources 

Monday, December 30, 2013

Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism

IGI Global: Call for Chapter Details

Call for Chapters: Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Facebook Send
2

Editors

Dr. Maurice Dawson, Alabama A&M University, USA
Dr. Marwan Omar, Nawroz University, Iraq

Call for Chapters

Proposals Submission Deadline: February 15, 2014Full Chapters Due: June 15, 2014Submission Date: October 15, 2014

Introduction

This handbook of research will explore multiple aspects of cyber terrorism and cyber crime in today's society. This book provides insights on the negatives uses of technology with comprehensive review of the associated vulnerabilities and mitigations. Researchers, practitioners, and professionals will benefits from this publication’s broad perspective.

Objective

This proposed publication takes an entirely different route in describing digital crime and cyber terrorism. This publication has the potential to aid organizations everywhere to effectively defend their systems.

Target Audience

The handbook of research is expected to get a large amount of attention in the cyber security realm. This will cover all emerging negative uses of technologies which will allow individuals to gain insight so they can better defend these new attacks. This can be used by training organization, intelligence community, and others responsible for network defense.

Recommended Topics


  • Network and Mobile Security
  • Virtual Words for Terrorism Training Grounds
  • Attacking Health Care Devices
  • Automobiles Access Points
  • Cyber Terrorism
  • Cyber Crime
  • Software Assurance
  • Exploiting Code Vulnerabilities
  • Future Predictions of Cyber Crime
  • Department of Defense Information Assurance Controls
  • Reverse Engineering
  • Vulnerabilities in Mixed & Augmented Reality
  • Vulnerabilities in Google Glass
  • Systems of Systems Attacks
  • Unmanned Systems Exploitations
  • Certification and Accreditation
  • Cryptosystems

We strongly welcome other topics suggestions, dealing with other negative uses of technology and science such as attacking national infrastructure, cloud computing security, offensive security practices, and other unknown exploits.

Submission Procedure

Researchers are invited to submit on or before February 15, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified March 31, 2014 about the status of their proposals and sent chapter guidelines. Authors of accepted proposals will be sent guidelines to prepare the full chapter (7,000 – 11,000 words length). Full chapters are expected to be submitted by June 15, 2014. All submitted chapter will be reviewed on a double-blind review basis. Contributors may also be requested to serve as a reviewer for this project.

Publisher

This handbook of research is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference”, “Business Science Reference”, and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.. This publication is anticipated to be released early 2015.

Important Dates

1st Proposal Submission Deadline: February 15, 2014
2nd Proposal Submission Deadline: March 15, 2014
Last Call for Proposals: April 15, 2014
Full chapter Submission: June 15, 2014
Review Process: June 15, 2014 –July 30, 2014
Review Results to Authors: August 15, 2014
Revised Chapter Submission: September 15, 2014
Final Acceptance Notifications: September 30, 2014
Submission of Final Chapters: October 15, 2014
Final Deadline: November 30, 2014

Inquiries

Inquires can be forwarded to electronically (Word document):
Dr. Maurice Dawson
Department of Management and Marketing
College of Business and Public Affairs
Alabama A&M University
Tel.: +1-256-372-4801
Primary Email: maurice.e.dawson@gmail.com
Secondary Email: maurice.dawson@aamu.edu

Windows vs Mac vs Linux: The Pros And Cons

Windows vs Mac vs Linux: The Pros And Cons

Windows vs Mac vs Linux: The Pros And Cons   
 
While the war of the OSes continues, we try to bring forth the good and bad of each!  
Rate this news:   (2 Votes)
Monday, December 30, 2013:  Here are a few facts about operating systems. Today, the market is dominated by Microsoft’s Windows, followed by Apple’s Mac OS X, which is a strong contender. And third, 2013 has been the biggest year for Linux-based operating systems.

That said, let’s take a look at some of the pros and cons of each of these platforms. This will come in handy when you are trying to choose which is best for you. We’ll start with the market leader.
Windows, Mac, Linux, Apple, Microsoft, Fedora, Debian, Ubuntu, Kali Linux, Macintosh, Windows vs Mac vs Linux, battle of OSs, news

Windows: Microsoft’s Windows OS has owned the lion’s share of the market in PCs for a long time now, but with the rise of mobile operating systems, it has lost favour to the Linux-based Android and Apple’s iOS operating systems.

Pros:

- Everything works on Windows. Well, almost everything. Still, when it comes to compatibility, neither Mac nor Linux can boast better records.

- Finding support for problems in Windows is very easy. That said, Mac and Linux aren’t far behind, but simply by the volume of users it has, there is much more help available for Windows.

- Features and functionality is another segment that Windows has been known for. The other two are catching up very fast though.

Cons:

- Being the most popular OS, it is also the most attacked. Hence, there are many viruses and other forms of malware for Windows.

- Windows OS eats a lot of your system’s resources and makes it slow. In fact, Windows Vista and Windows 7 can easily be called the slowest of them all.

- It’s proprietary and so comes at a cost.

Mac: What many newbies don’t know is that the Macintosh OS is actually older than Windows. In fact, Apple’s platform was the first ever successful graphical-based operating system and it was released a year before Windows.

Pros:

- Mac does not get viruses. This is one of the biggest USPs of the platform. Because of its lesser market share, there aren’t many viruses for Apple’s Mac OS.

- To run a Mac, you must have a Mac too. Being compatible only with Apple’s devices, this OS always runs smoothly as the devices are made for the OS.

- On the presentation department, Apple has always been ahead of Windows. Mac always comes with a style quotient attached to them.

Cons:

- If you thought Windows was expensive, then Mac isn’t the one for you. It is even more expensive than Windows.

- The second point in the pros section is also a con for the Mac. You have to buy an Apple computer to run the Mac. These computers are expensive.

- Mac has never been known for its gaming compatibility, even though the computers are immensely powerful. Moreover, many other programs do not run on the Mac PC.

Linux: The way things stand right now, laptops and PCs are becoming passé and mobile operating systems are gaining popularity. Linux is being adopted like never before!

Pros:

- Linux is free and that is its biggest USP. You have to pay nothing. You can download a copy of your favourite Linux distro and then even build your own distro using this one.

- Linux is just the kernel, not the OS. Being proprietary OSes, Windows and Macs come about once a year or not even that. Linux, on the other hand, has a variety of options available. You can go from Ubuntu to Fedora to Debian to Arch Linux. If you’re interested in hacking, then Kali Linux is at your disposal.

- An interesting thing about Linux is that it is almost immune to viruses.

Cons:

- Linux is somewhat more complicated than Mac or Windows. You can’t always go clickety click on the mouse to unlock its full potential.

- Linux also has a compatibility issues, but that is strictly because of its market share. There are open source alternatives to almost all programs though.

- While many have started selling Linux-based computers, the number of vendors is still low. You will most often have to buy a Windows PC and then download Linux onto it. The OS is free though, so there’s no added cost.

When it comes to choosing your operating system, you must focus on what your usage is. A gamer will always prefer a Windows PC, simply because all games are compatible with it. On the other hand, a sound engineer or a video editor will prefer to work with Mac for its superior support in that segment. Linux users are open source proponents and they like the flexibility of the OS. Often, Linux users are more serious computer users than other and know about coding etc.