0207~0208_KOBO閱讀器
0207~0213_全家取貨

英文書 > 全部商品

The New Colonialism

Ingram 出版
2025/12/31 出版
9 特價2340
立即代訂
下次再買

The Surveillance Century

Ronan,Khoury  著
Ingram 出版
2025/12/31 出版
9 特價2925
立即代訂
下次再買

The New Colonialism

Ingram 出版
2025/12/31 出版
9 特價2925
立即代訂
下次再買

Locked Up

Wiley 出版
2025/12/31 出版
9 特價1368
立即代訂
下次再買

Lessons from the Frontlines

Assaf,Keren  著
Wiley 出版
2025/12/31 出版
9 特價1197
立即代訂
下次再買

Apple Intelligence for Masterminds

J D,Gauchat  著
Ingram 出版
2025/12/29 出版
9 特價1537
立即代訂
下次再買

ChatGPT for Business 101

Russel,Grant  著
2025/12/19 出版

Outsmart the competition, streamline your success, and transform effort into achievement with Artificial Intelligence!Navigating today's business landscape feels like running a never-ending marathon, doesn't it?With fierce competition at every turn and customers expecting the moon, it seems like you're constantly being pulled in a million directions.Cutting operational costs while boosting productivity and innovation isn't just a goal-it's your daily challenge.But what if there's a secret weapon that can not only help you meet these challenges but turn them into your biggest opportunities for growth?Imagine a tool so powerful that it rewrites the playbook on business efficiency and innovation. That secret weapon? The dynamic duo of Artificial Intelligence (AI) and ChatGPT.Businesses diving into AI technologies have witnessed their employee performance rocket by 40%.And it doesn't stop there.Companies rolling out AI-driven support solutions have seen customer complaints plummet by the same margin.These figures aren't mere stats; they're proof of the seismic shift AI and ChatGPT is causing in the business world.Yet, many business owners still view AI as a distant, complex frontier, suited only for the tech elite.If you've ever thought, "AI sounds like a hassle," or "Tech's not my thing, how am I supposed to use this?" you're not alone.But here's the thing: AI and ChatGPT are more within your grasp than ever before, ready to blend into your current operations, no matter your business size or tech-savvy.With this guide, you've found your roadmap to redefining your business.Inside, you will discover: A clear path to automating mundane tasks - free your team to focus on what they do best. Imagine reclaiming hours of your day, every day!Revolutionized customer support that doesn't sleep - make "We're currently closed" a thing of the pastE-commerce strategies tailored by AI, turning casual browsers into loyal customers - it's like having a sales guru on call 24/7, without the hefty salaryContent that captivates, crafted with the help of AI - produce engaging, relevant content that speaks to your audience and sets you apart from the competitionData analysis without the headache to help you gain the insights you need to make informed decisions quickly and confidentlySales and lead generation tactics that actually work - turn cold leads into hot prospects and skeptical browsers into buyers!And much more!This book is designed with you in mind - clear, actionable, and ready to integrate into your business, regardless of your tech background.Now, you're faced with two roads: one path leading to business as usual, the other to unlocking potential you never knew existed.The way forward is crystal clear.Let ChatGPT become your new competitive edge and watch your business transform.

9 特價547
立即代訂
下次再買

More Human Than Human

Ingram 出版
2025/12/01 出版
9 特價684
立即代訂
下次再買

CompTIA Security+ Last Minute Revision

Xandar,Pelin  著
Gitforgits 出版
2025/11/26 出版

If you're getting ready for the SY0-701 exam and need some last-minute study material, this CompTIA Security+ Last Minute Revision guide is just what you need. It's a concise, fast-paced reference book that'll help you get up to speed. Over 400 acronyms and explanations are included, all mapped directly to the five exam domains including: General Security ConceptsThreats, Vulnerabilities and MitigationsSecurity ArchitectureSecurity Operations, andSecurity Program Management and OversightThis book focuses on recalling things when you're feeling pressured. Every term or concept has a definition and a practical context, so you can remember an acronym while you're answering scenario questions. It's really easy to find what you're looking for in these quick cross-references, which link related controls, protocols and frameworks. It'll help you convert short-term memory into judgment that's ready for the exam.This concise companion helps sharpen recall, connect concepts and approach exam day with clear focus. Inside, you get quick crosswalks between exam objectives and operational tasks, and mnemonics for retention.So, how do you use it?Just flip to the domain you need to reinforce, read the related acronym, then answer a short practice set. You can use the Excel index to find a term in seconds. Then run through the mock exam to time your recall and adjust your focus.Who should use this book?This book is for security professionals who've already got experience under their belts and are ready to put the finishing touches on their certification. And, if you like short, practical examples over long, boring prose, you will enjoy this one too. Even the instructors who need a compact classroom handout keep asking for such a book.

9 特價2394
立即代訂
下次再買

Web Development

2025/11/26 出版

Master the Real Web Development That Companies Pay For in 2025 - Not Yesterday's Theory. This book is the complete 2025 roadmap that actually gets you hired. You start with the truth about how the modern web really works - HTTP, the browser, Git, DevTools - exactly like Stanford and CMU teach, but updated for today. Then you build proper semantic HTML5 + accessibility that passes WCAG and real screen-reader tests. You master CSS the right way: box model, specificity, Flexbox, Grid, logical properties, Tailwind, micro-interactions that run at 60 fps. JavaScript comes next - modern ES2025, closures, async/await, Fetch, modules - with zero fluff. You move straight into React the way companies actually use it in 2025: hooks, effects, routing, data fetching, component thinking. Backend follows with Node.js, Express, REST, GraphQL Federation (the way Netflix and PayPal really do it), MongoDB, authentication, security that stops real attacks. Then testing with Jest + Cypress, CI/CD with GitHub Actions, deployment to Vercel/Netlify/AWS. Finally the stuff everyone else ignores but pays the most for: Progressive Web Apps, Jamstack + Headless CMS, Headless Commerce, Server-Driven UI like Airbnb/Netflix, WebAssembly in the browser and on the edge, AI-powered personalization and RAG chatbots that talk to your own data. No other book gives you the exact 2025 stack that FAANG, startups, agencies, and enterprises are fighting over right now. Others teach you React from 2021 or Node from 2019 and call it "modern." This one is the only one built from the actual syllabi of Stanford CS193X, CMU 17-637, MIT xPRO MERN - then pushed forward with everything that changed in 2024-2025: Tailwind dominance, AI-assisted workflows, Wasm everywhere, SDUI, headless everything. Every chapter ends with the real job-market skill that makes recruiters message you first, plus the live case studies (Starbucks PWA, Netflix federation, Figma Wasm) that make you sound dangerous in interviews. This is the book I wish existed when I was grinding LeetCode and still getting rejected for "lack of production experience." Copyright disclaimer: The author has no affiliation with Stanford, Carnegie Mellon, MIT, or any institution mentioned. This work is independently produced under nominative fair use for criticism, comment, and educational purposes.

9 特價1520
立即代訂
下次再買

Cybersecurity - A Broad Perspective

2025/11/24 出版

The importance of cybersecurity in the rapidly changing digital world, when technology is intricately intertwined into every aspect of our lives, cannot be understated. As we embrace the limitless potential of linked systems, we are faced with previously unheard-of difficulties that call for our consideration, comprehension, and constructive action. This introduction provides a preamble to the terrifying field of cybersecurity, which goes well beyond data protection. It is a watchful defender of the faith in the digital infrastructure that guides our day-to-day activities. As our reliance on smart gadgets, cloud computing, and linked networks grows, so do the dangers that come with living in this digital frontier. The book covers the risks associated with cyberattacks, how to identify them, and basic security precautions to keep them at bay. Greetings from the realm of cybersecurity, where knowledge is the key to resilience and alertness is the currency of trust.For more details, please visit https: //centralwestpublishing.com

9 特價3078
立即代訂
下次再買

Cybersecurity for 2025

2025/11/23 出版

Cybersecurity for 2025: Principles, Practice, and Preemptive Strategy is your no-nonsense guide to surviving-and thriving-in tomorrow's digital battlefield. This book packs five tight parts into one actionable read. Part 1 nails the 2025 threat scene: nation-states, ransomware-as-a-service, AI deepfakes, and the new "preemptive" mindset that beats detect-and-respond. You get NIST CSF 2.0's fresh Govern function, Parkerian Hexad, Saltzer-Schroeder principles, and STRIDE threat modeling. Part 2 dives into attack vectors-TCP/IP hijacks, buffer overflows, XSS, SSRF, side-channels, and browser data leaks. Part 3 flips to Blue Team ops: SOC workflows, IR playbooks, forensics, SIEM labs with Splunk, and Zero Trust pillars. Part 4 arms the Red Team: MITRE ATT&CK, nmap, Nessus, Metasploit, and ethical lotL tactics. Part 5 tackles the frontier-cloud shared responsibility, IoT botnets, OT convergence, AI malware, model poisoning, plus GRC, policy writing, and a picoCTF capstone. Every chapter ends with a hands-on lab, tabletop, or code exercise you can run today. What sets this book apart is ruthless 2025 focus and zero fluff. Other texts rehash 2015 exploits or bury you in theory; this one cites ENISA 2025, CrowdStrike 2025, Gartner preemptive forecasts, and Cloudflare's live PQC rollout. You won't find recycled OWASP Top 10 lists-you'll build IAM policies in AWS JSON, craft iptables rules, debug stack-smashing in GDB, and write Splunk alerts that trigger in real time. Labs use free tools: Kali, Metasploitable, Nessus Essentials, Splunk trial, Wireshark, OpenSSL, Shodan. The capstone sends you to picoCTF to prove you can pivot from crypto to forensics to rev-eng under pressure. No other single volume ties academic rigor (MIT, Stanford, CMU syllabi) to street-ready skills while prepping you for the quantum cliff and AI arms race. (c) 2025 Azhar ul Haque Sario. This work is not affiliated with, endorsed by, or sponsored by MIT, Stanford, Carnegie Mellon, NIST, ENISA, CrowdStrike, Gartner, Cloudflare, Splunk, Tenable, or any cited entity. All trademarks are used under nominative fair use for identification and educational purposes only.

9 特價1520
立即代訂
下次再買

Cult of the Dead Cow

Joseph,Menn  著
PublicAffair 出版
2025/11/21 出版

The shocking untold story of the elite secret society of hackers fighting to protect our freedom, "a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age" (The New York Times Book Review) Cult of the Dead Cow is the tale of the oldest active, most respected, and most famous American hacking group of all time. With its origins in the earliest days of the internet, the cDc is full of oddball characters--activists, artists, and musicians--some of whom went on to advise presidents, cabinet members, and CEOs, and who now walk the corridors of power in Washington and Silicon Valley. Today, the group and its followers are battling electoral misinformation, making personal data safer, and organizing to keep technology a force for good instead of for surveillance and oppression. Now featuring a new afterword with updates on the collective, Cult of the Dead Cow describes how, at a time when governments, corporations, and criminals hold immense power, a small band of tech iconoclasts is on our side fighting back.

9 特價649
立即代訂
下次再買

Social Media & Child Safety

2025/11/20 出版

In today's digital age, social media is a big part of life, even for kids. But how can children use it wisely while staying safe? This comprehensive guide is designed to help kids, parents, and educators understand the opportunities and challenges of social media.Inside this book, you'll discover: The Pros: Explore how social media can inspire creativity, boost learning, and help kids connect with friends and family.The Cons: Understand risks like cyberbullying, oversharing, and screen addiction-and learn how to manage them.Safety Tips: Master practical tools like privacy settings, strong passwords, and recognizing fake accounts or scams.The Laws: Learn about age restrictions, digital privacy rights, and online behavior rules that every child should know.It also includes advice for parents on how to support their children in the digital world. A must-read for parents and anyone navigating the intersection of kids and technology!

9 特價342
立即代訂
下次再買

More Human Than Human

Ingram 出版
2025/11/17 出版
9 特價855
立即代訂
下次再買

Practical C++23 Backend Programming, Second Edition

Gitforgits 出版
2025/11/11 出版

This second edition teaches C++ programmers the practical skills and modern strategies they need to build strong backend systems. All you need is some basic knowledge of C++, and this book will teach you everything else you need to become a backend developer. Each chapter shows you step-by-step examples, real code, and workflows that you can follow to get results.The book starts with the basic structure of backend systems and shows how APIs are the most important way of communicating and how to use high-performance solutions like gRPC to go beyond REST. It will teach you to use, test and improve API endpoints in realistic C++ projects. This will help you to feel more confident in designing contracts first and in real-time data flows. The key parts of the book teaches you to cache things, to make sure your data is correct and to avoid common problems with correct troubleshooting.A big part of the book looks at how to set up and manage modern web servers. It teaches you to use C++ applications with Nginx, SSL, reverse proxies and load balancers in a way that's easy to understand. We then move on to more practical chapters on automated testing, including both unit and integration tests. You get to learn about containerisation, cloud deployment using AWS Elastic Beanstalk, environment configuration, monitoring, and scaling, and all this is taught step-by-step.The book makes use of simple and clear to teach network programming, how things are set up, and the important patterns that are used in today's distributed systems. While you learn, you please make a note that this edition is focused on practical scenarios and does not attempt to cover highly complex or edge-case architectures.Key FeaturesLearn to design APIs and high-performance gRPC endpoints and services.Create and protect backend apps using environment variables, secrets, and strong configuration management.Use advanced caching strategies, including in-memory, Redis, and custom eviction for scalable backends.Set up and optimise Nginx as a web server, reverse proxy, and SSL-enabled application gateway.Use Google Test to perform unit and integration testing.Use Docker to create containers.Use AWS Elastic Beanstalk to deploy backends into production.Use AWS CloudWatch, alarms, and custom log analytics to check the health of apps and resourcesSet up ways to integrate and migrate databases with no deployment errors.Keep systems updated, roll back if necessary, and make customizations to respond changing traffic and business demands.Table of ContentIntroduction to Backend DevelopmentC++ Refresher and EssentialsDeep Dive into AlgorithmsMastering Git and GitHubManaging Database Operations with MongoDBCrafting REST APIs with gRPCDealing with Client-Side and Server-Side CachingManaging Web Servers with NginxTesting C++ BackendDeploying Application

9 特價2394
立即代訂
下次再買

The Invisible Wars

Vij Books 出版
2025/11/11 出版

Power today is exercised in quiet rooms and cached files, not on battlefields. If you want to understand why a headline moves markets, why a lawsuit reroutes a supply chain, or why a rumour becomes policy, this is your field guide to the grey zone conflict that shapes your life.This book exposes how states win with economic sanctions, information warfare, lawfare and geopolitics, currency warfare, and cyber operations-then gives you clear tools to read the signals and resist being played.-Learn how narratives are engineered and how to verify before you share-See how payment rails, ratings, and standards become weapons without warning labels-Build practical defences at home, at work, and in your cityWritten for policy professionals, executives, journalists, and curious citizens, it makes the invisible visible with case studies, causal maps, and a no-drama vocabulary for complex systems. You will finish with a dashboard for cyber operations strategy, a checklist for sanctions that punish architects rather than populations, and a civic ethic for non-kinetic deterrence that preserves legitimacy. If you're seeking information warfare explained without hype-and a sober path from alarm to agency-start here..

9 特價2047
立即代訂
下次再買

Practical GRC Implementation

SPD 出版
2025/11/10 出版

Cyber GRC "Auditors and Auditees" need to adopt a structural approach towards building, implementing and maintaining organizations digital systems security posture, while addressing associated "Risk, Threat and Vulnerabilities". Auditing and managing multiple global Information security standards, guidelines and compliance to applicable regulations/cyber laws through traditional method is proving to be a challenge.Organizations need to adopt a" Unified and Integrated" audit framework and run the security governance program as "Managed GRC as a Service". The book presents a practical audit and implementation approach which will benefit both experienced GRC professionals and freshers in the field.

9 特價2052
立即代訂
下次再買

That So Evelyn, The Blog

2025/11/08 出版

That So Evelyn, The Blog: Of Skincare, Education, Opinions, Travel and Christianity is the author's personal collection of blog series that is being remade into a book to help readers get some insights on topics related to skincare, educational, opinions and christianity. All the topics mentioned in this book are being researched first before the author penned it down into her blog. The purpose of turning this series of blog into a book is to help the author's readers gain some insights and knowledge about the topics that is mentioned in this book. The author hopes that through this book, it will help inspire her readers into nonfiction literary works.

9 特價273
立即代訂
下次再買

WebAssembly 2.0 Essentials, Second Edition

Gitforgits 出版
2025/11/07 出版

This book is for you if you're tired of watching JavaScript struggle with complicated calculations while your users get impatient. I wrote this second edition because WebAssembly 2.0 changes everything, and I wanted to show you exactly how to use it without the usual technical book problems.The first thing we'll do is go through the basics, like memory management and control flow, which are the most important. Then we'll move on to putting together C, C++, Rust, and Python into Wasm modules that actually work. I'll show you how to use multi-threading, profiling and optimisation techniques that I've used in real projects, not just theoretical exercises. I know a lot of you have old Wasm 1.0 code, so I've written a whole chapter about how to move it over without causing any problems. And we'll also learn how to use WebAssembly in other ways, not just in browsers. You'll learn to work with Dapr for distributed microservices, deploy on Kubernetes, and build cloud-native applications that scale well.There is working code in every chapter that you can use right away. There is no unnecessary information, just practical techniques that solve real problems. I've figured out the tricky parts and the things that can go wrong, and I'm sharing them what actually works. By the time you finish this book, it will have taught you everything you need to build WebAssembly applications so quickly that people will be amazed.Key FeaturesPut together C, C++, Rust, and Python into high-performance WebAssembly modules using Emscripten.Build advanced multi-threaded apps using atomic operations, shared memory and thread-safe sync patterns.Migrate old Wasm 1.0 projects to version 2.0 using proven strategies.Combine WebAssembly with Dapr for microservices using patterns for managing data and sending messages.Deploy and scale Wasm workloads on Kubernetes clusters with complete control over configuration and secrets management.Make performance better by using systematic profiling and advanced compilation techniques for production apps.Take care of module imports, exports, and JavaScript interoperability.Use tables, memory semantics and dynamic dispatch mechanisms for complex logic.Manage networking, security, monitoring, and debugging for WebAssembly cloud-native deployments at scale.Table of ContentIntroduction to WebAssemblyFundamentals of WebAssembly ProgrammingWebAssembly Modules and SemanticsBridging WebAssembly with High-Level LanguagesAdvanced WebAssembly Tools and TechniquesAdvanced Performance OptimizationPractical Migration to Wasm 2.0Using WebAssembly with DaprRunning WebAssembly Apps on Kubernetes

9 特價2394
立即代訂
下次再買

The Dark Web and Scams

Ivette,Smith  著
Ivette Smith 出版
2025/11/07 出版

The internet has a dark side-are you prepared to face it?In The Dark Web and Scams: A Guide for Personal Cybersecurity, Ivette Smith takes readers behind the hidden layers of the online world where anonymity fuels cybercrime, illegal marketplaces flourish, and digital scams are designed to deceive even the smartest users.Written for everyday internet users, professionals, students, and cybersecurity beginners, this practical guide reveals: What the dark web really is-beyond the myths and Hollywood portrayalsHow cybercriminals operate, including phishing, identity theft, ransomware, romance scams, and cryptocurrency fraudWarning signs that your personal information may be compromisedSteps to protect your accounts, devices, privacy, and online identityTools to secure your digital footprint and stay ahead of evolving cyber threatsBlending real-world examples, expert insights, and easy-to-follow strategies, this book empowers you to navigate the digital world with confidence. Whether you're browsing social media, shopping online, or managing financial accounts, you'll learn how to safeguard your data and avoid becoming a victim.Stay informed. Stay protected. Stay one step ahead in the digital age.

9 特價649
立即代訂
下次再買

The Dark Web and Scams

Ivette,Smith  著
Ivette Smith 出版
2025/11/07 出版

The internet has a dark side-are you prepared to face it?In The Dark Web and Scams: A Guide for Personal Cybersecurity, Ivette Smith takes readers behind the hidden layers of the online world where anonymity fuels cybercrime, illegal marketplaces flourish, and digital scams are designed to deceive even the smartest users.Written for everyday internet users, professionals, students, and cybersecurity beginners, this practical guide reveals: What the dark web really is-beyond the myths and Hollywood portrayalsHow cybercriminals operate, including phishing, identity theft, ransomware, romance scams, and cryptocurrency fraudWarning signs that your personal information may be compromisedSteps to protect your accounts, devices, privacy, and online identityTools to secure your digital footprint and stay ahead of evolving cyber threatsBlending real-world examples, expert insights, and easy-to-follow strategies, this book empowers you to navigate the digital world with confidence. Whether you're browsing social media, shopping online, or managing financial accounts, you'll learn how to safeguard your data and avoid becoming a victim.Stay informed. Stay protected. Stay one step ahead in the digital age.

9 特價991
立即代訂
下次再買

Building Accessible Web Experiences with AI

Cognifi Media 出版
2025/11/04 出版

Building Accessible Web Experiences with AI was conceived as more than a technical manual-it is a bridge between disciplines, generations of technology, and philosophies of design. At its heart lies a simple conviction: that technology should serve everyone, not merely those who can adapt to its conventions.For decades, digital accessibility was framed primarily as a matter of compliance-a box to be checked to meet legal standards such as the Americans with Disabilities Act (ADA) or the Web Content Accessibility Guidelines (WCAG). While compliance remains critical, it does not capture the full essence of inclusion. True accessibility is about equity, empathy, and awareness. It is about designing systems that acknowledge the full spectrum of human diversity-visual, auditory, motor, cognitive, and situational.This book invites developers, designers, and digital professionals to rethink accessibility not as a constraint but as a catalyst for creativity. It presents artificial intelligence not as a threat or shortcut but as an ally-a means to scale inclusion, enhance efficiency, and illuminate patterns that human perception alone might miss.The primary goal of Building Accessible Web Experiences with AI is educational: to equip practitioners at every level with the conceptual understanding and technical tools to create inclusive, intelligent experiences that evolve with their users.

9 特價444
立即代訂
下次再買

The Global Prompt Engineer

2025/11/01 出版

Ready to master the essential skill of the AI era? This book is your complete guide to the world of prompt engineering. We start with the absolute basics. You will learn the art and science of giving clear instructions to AI. We cover how to structure your prompts for the best results. You will master techniques like zero-shot and few-shot learning. The book teaches you how to guide an AI to think step-by-step. Then, we move to more advanced topics. You will explore powerful reasoning methods. We cover how to automate and optimize your prompts. You will learn to build complex AI systems. This includes connecting AI to external knowledge with RAG. We discuss how to design autonomous AI agents. Security is a key focus. You'll learn to defend your prompts from attack. The book also explores the frontiers of AI. We look at applications in environmental science, robotics, and healthcare. This journey takes you from foundational principles to the strategic future of the profession. What makes this book different? It's not just theory. Other books tell you what prompt engineering is; this book shows you how it's done all over the world. Every single concept is grounded in a detailed, real-world case study from a different country. You will see how core principles are used to power educational technology in India. You'll learn how advanced reasoning is applied in Germany's high-tech manufacturing sector. We explore how AI agents assist financial advisors in the United States and how multimodal prompts are enhancing medical diagnostics in France. From building trustworthy public services in the UK to developing care robots in Japan, each chapter provides a practical, tangible example. This unique global perspective gives you an unparalleled competitive advantage, equipping you not just with technical skills, but with the strategic foresight to apply them to solve real challenges. Disclaimer: This author has no affiliation with the board and it is independently produced under nominative fair use.

9 特價1520
立即代訂
下次再買

Digital Product Accessibility

2025/11/01 出版

Navigating the complex world of digital accessibility laws just got a whole lot easier. This book is your guide to digital accessibility across the globe. It takes you on a tour of more than 15 countries. We explore how different nations ensure technology is usable for everyone. You will learn about the laws that shape the digital world. See how the United States relies on court cases to define accessibility. Discover Canada's mix of federal and provincial rules. Understand the European Union's powerful, market-driven approach. We also journey through the unique systems in Australia, Japan, Brazil, South Korea, and many more. Each chapter provides a clear, structured look at a country's regulatory mandate. It shows how public and private organizations implement these rules in the real world. You'll see the innovation engines driving new assistive technologies. Most importantly, you will understand the human element and the crucial role of disability advocacy. While many books focus narrowly on technical guidelines or the laws of a single country, this book offers a unique comparative perspective that you won't find anywhere else. Our four-part analytical framework-examining the laws, practical implementation, innovation, and the human element-is applied consistently to every nation. This allows you to draw meaningful comparisons and understand why some approaches succeed while others fail. This book moves beyond theory and technical jargon. It connects the legal frameworks to the real-world experiences of businesses, innovators, and people with disabilities. It provides a holistic, practical, and global understanding that a standard compliance manual simply cannot offer, giving you the insights needed to create truly inclusive digital products. This author has no affiliation with the board and it is independently produced under nominative fair use.

9 特價1520
立即代訂
下次再買

Coding for Dummies, All New Edition

For Dummies 出版
2025/10/29 出版

Your first step toward thinking like a coder Coding For Dummies is one of the most popular get-started guides for new coders. This all- new edition demystifies essential coding concepts before diving into building simple apps in Python and JavaScript. For anyone brand-new to writing code, this book is an ideal first step, because you'll get an overview of how coding works, the essential tools of coding, and how to apply coding in different ways. Plus, you'll get insight into how new tools like AI can quickly boost your coding know-how. Enter the world of code with this easy-to-follow Dummies guide! Learn the basics of coding, including key concepts you'll need in every coding language Get a rundown of the most popular language, and start coding in JavaScript and Python Follow step-by-step instructions to build your first apps Discover how AI can help you become a better, faster coder Looking for a foundation in the basics of coding, plus simple tasks to help you get started? Coding For Dummies is the book for you.

9 特價1026
立即代訂
下次再買

Large Language Models

Mit Press 出版
2025/10/19 出版

An in-depth history of Large Language Models--and what their ubiquity, disruption, and creativity mean from a wider sociopolitical perspective. In November 2022, ChatGPT swept the globe with a mixed frenzy of excitement and anxiety. Was this a step closer to reaching singularity or just another marvel in machine learning? Author Stephan Raaijmakers provides a comprehensive introduction to Large Language Models (LLMs), describing what exactly they are capable of from a technical and creative standpoint. This concise volume covers everything from the architecture of LLM neural networks to the limitations of LLMs to how our governments can regulate this technology. In explaining how exactly LLMs learn from data sets, Raaijmakers defangs the more sensational arguments we may be familiar with. Instead, he offers a more grounded approach to how this groundbreaking--and increasingly ubiquitous--form of artificial intelligence will shape our society for years to come.

9 特價648
立即代訂
下次再買

Networking for System Administrators

2025/10/17 出版

"One of the best technical writers in the networking and security environments." - Midwest Book ReviewStop waiting for the network team!If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network-once they know how to unlock it.Most sysadmins don't need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you: How modern networks really workThe essentials of TCP/IPThe core of IPv4 and IPv6The right tools to diagnose network problems, and how to use themTroubleshooting everything from the physical wire to DNSHow to see the traffic you send and receiveConnectivity testingHow to communicate with your network team to quickly resolve problemsA sysadmin doesn't need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues will transforms a good sysadmin into a great one.The first edition of Networking for System Administrators unlocked networking for hundreds of thousands of sysadmins. This second edition promises the same, and more!

9 特價2631
立即代訂
下次再買

Web Programming with Go, Second Edition

Ian,Taylor  著
Gitforgits 出版
2025/10/17 出版

This is a new edition of "Web Programming with Go" and it's designed to help both entry-level and professional developers build and launch functional web applications using Go's core libraries. Every chapter gives you practical lessons, from setting up Go projects and building strong backend routes to frontend-backend integration, session management, authentication, concurrency, and connecting external APIs.This book is a hands-on way to learn key skills like testing, logging, error handling and performance tuning, all explained in simple, direct language. The real code and examples make it easy to understand and use the concepts. It covers nearly every major aspect of Go web development, but keeps examples straightforward and avoids complex edge cases, making it ideal for learners and practitioners who want clarity and reliable progress. You'll learn to structure projects, design backend services, manage sessions, secure authentication, and integrate external APIs with step-by-step Bookstore examples. It's got clear, practical techniques for routing, concurrency, testing, logging, performance and error handling, and it uses code that's easy to understand and explanations that are easy to follow.Basically, this book looks at modern Go features without getting into complicated or niche scenarios, making the lessons useful for real projects. This edition makes it easy for you to get from setup to deployment by focusing on simplicity over unnecessary detail.Key FeaturesGet your web projects sorted with Go, using organised code, a modular design, and real-world workflows.You'll build, secure and test RESTful APIs using Go's net/http, Gorilla Mux and JSON best practices.Put in place user authentication, role-based access, and strong password protection to make sure your users have a safe experience.Get the front end and back end talking to each other by having clear API contracts and simple JSON data interchange practices.Use Go's concurrency tools to boost performance, scale up data fetching, and avoid deadlocks.Mock databases, APIs, and dependencies for fast, isolated, and reliable automated test routines.Set up session management, secure cookies, and resilient authentication flows to keep users logged in.Keep an eye on, log and trace application events to quickly find and fix problems.Use Go's HTTP client patterns to integrate payment gateways, external APIs, and third-party services.Come up with easy-to-understand error messages and stick to the standard incident response plans.Table of ContentIntroduction to Web Development in GoStructuring Go Web ApplicationHandling HTTP Requests and RoutingTemplating and Rendering ContentInteraction with DatabasesConcurrency in GoSessions, Authentication, and AuthorizationFrontend and Backend CommunicationTesting and Debugging

9 特價2394
立即代訂
下次再買

Networking for System Administrators

2025/10/16 出版

"One of the best technical writers in the networking and security environments." - Midwest Book ReviewStop waiting for the network team!If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network-once they know how to unlock it.Most sysadmins don't need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you: How modern networks really workThe essentials of TCP/IPThe core of IPv4 and IPv6The right tools to diagnose network problems, and how to use themTroubleshooting everything from the physical wire to DNSHow to see the traffic you send and receiveConnectivity testingHow to communicate with your network team to quickly resolve problemsA sysadmin doesn't need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues will transforms a good sysadmin into a great one.The first edition of Networking for System Administrators unlocked networking for hundreds of thousands of sysadmins. This second edition promises the same, and more!

9 特價1754
立即代訂
下次再買

Hacking for Dummies

Kevin,Beaver  著
For Dummies 出版
2025/10/10 出版

Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data. You won't learn how to steal your neighbors' Wi-Fi, but you will gain the skills to keep nosy hackers out of your systems and applications. With clear, jargon-free explanations, you'll learn to recognize cyberthreats and keep your information safe. This updated edition includes new content on AI, the Internet of Things (IoT), and the security implications of hybrid work. Understand the tools hackers use to steal sensitive data from individuals and businesses Discover methods of protecting your information--including improving your security, recognizing phishing scams, and more Assess your current network and cloud configurations from a hacker's perspective using proven vulnerability and penetration testing techniques Defend against AI-generated scams, lost devices, and other common threats Hacking For Dummies is for anyone looking to protect their devices from hacking--at home, at the office, or anywhere in-between.

9 特價1026
立即代訂
下次再買

Digital Dictatorship

Avery,Grant  著
Vij Books 出版
2025/10/07 出版

A world without chains can still be a prison. Today's most powerful regimes-whether in Beijing, Silicon Valley, or your own city-no longer rely on brute force to ensure obedience. They rely on code, algorithms, and incentives that reshape behavior so quietly that compliance feels voluntary. This is the unsettling reality of digital authoritarianism, where freedom is exchanged for convenience and control is enforced without a single shot fired.This book exposes how algorithmic governance and surveillance capitalism critique converge to create a system that rewards predictability and punishes deviation. From China's social credit system to Western experiments in predictive policing, from corporate loyalty apps to platform moderation rules, the same logic is at work: technology becomes the new architecture of power.Designed for thoughtful readers who sense that something deeper than "privacy loss" is at stake, this book connects history, psychology, and culture to reveal how societies are being trained into compliance. It challenges the belief that democracy and dictatorship are separate technological futures, showing instead how they are converging on the same system of engineered obedience.Readers will gain: - A clear framework for recognizing when convenience disguises control; - Insight into how behavioral nudging technology normalizes submission; - An understanding of how corporate surveillance and state power reinforce each other; - Practical clarity on where resistance is still possible.

9 特價2632
立即代訂
下次再買

Wars Without Flags

Rowan,Hale  著
Vij Books 出版
2025/10/07 出版

War no longer wears a uniform. From the battlefields of Ukraine to the deserts of Africa and the networks of cyberspace, power is being fought over in ways most of the world barely sees. Militias, private armies, and cyber mercenaries are replacing traditional forces, while AI warfare and disinformation reshape the very idea of sovereignty. Violence has become deniable, outsourced, and profitable-a shadow marketplace of force where loyalty is bought and borders are irrelevant.This book pulls back the curtain on the world of proxy warfare, exposing how private military companies, hacker-for-hire groups, and autonomous weapons are redrawing the global map. Drawing on gripping case studies from today's conflicts, it explains why governments outsource war, how militias gain legitimacy, and what happens when algorithms make life-and-death decisions.For readers of geopolitics, security, technology, or current affairs, this is an urgent and accessible guide to the new face of conflict. Whether you are curious about the Wagner Group, anxious about autonomous weapons ethics, or seeking to understand the hidden forces behind gray zone conflict, this book delivers clarity where most headlines deliver noise.By the end, you'll see how these invisible wars touch business, democracy, and daily life-and why understanding them is essential to navigating the century ahead. It offers a sharper lens for interpreting world events and a deeper awareness of the risks and realities shaping tomorrow's order.This is not a distant theory of war's future. It is the inside story of the world already here-where cyber war, militia warfare, and AI-driven conflict are defining power in the twenty-first century.

9 特價2340
立即代訂
下次再買

Digital Dictatorship

Avery,Grant  著
Vij Books 出版
2025/10/07 出版

A world without chains can still be a prison. Today's most powerful regimes-whether in Beijing, Silicon Valley, or your own city-no longer rely on brute force to ensure obedience. They rely on code, algorithms, and incentives that reshape behavior so quietly that compliance feels voluntary. This is the unsettling reality of digital authoritarianism, where freedom is exchanged for convenience and control is enforced without a single shot fired.This book exposes how algorithmic governance and surveillance capitalism critique converge to create a system that rewards predictability and punishes deviation. From China's social credit system to Western experiments in predictive policing, from corporate loyalty apps to platform moderation rules, the same logic is at work: technology becomes the new architecture of power.Designed for thoughtful readers who sense that something deeper than "privacy loss" is at stake, this book connects history, psychology, and culture to reveal how societies are being trained into compliance. It challenges the belief that democracy and dictatorship are separate technological futures, showing instead how they are converging on the same system of engineered obedience.Readers will gain: - A clear framework for recognizing when convenience disguises control; - Insight into how behavioral nudging technology normalizes submission; - An understanding of how corporate surveillance and state power reinforce each other; - Practical clarity on where resistance is still possible.

9 特價2047
立即代訂
下次再買

C++ Networking 101, Second Edition

Gitforgits 出版
2025/10/06 出版

The point of this edition is to help C++ programmers get the skills and confidence they need to do a wide range of networking tasks. The book gives lots of practical, easy-to-follow examples and covers most key areas of network programming, but intentionally leaves out highly complex scenarios.It starts with the basics of how C++ works with TCP/IP and gradually builds on that as you learn to write client-server applications, configure IP addressing and subnets, implement protocols like HTTP, FTP, SMTP, IMAP, and DNS, and handle network communication errors effectively. It's packed with clear explanations and real code that works. You'll dive into VPN setups, wireless networking standards, asynchronous programming models, and network simulations, using modern C++23 features throughout. As the chapters go on, the focus moves on to getting the most out of devices and making them run smoothly. This includes using NETCONF to automate device configurations, managing firmware updates, tweaking socket behavior for better performance, setting up recovery systems, and making diagnostic tools. You'll also set up network monitoring using Nagios, along with custom C++ checks to track faults, performance metrics, and security events in real time. After finishing, you'll be able to think and work like a network programmer and administrator, and you'll be ready to use your skills in real-world situations.Key FeaturesBuild strong foundations in TCP/IP networking using modern C++ coding examples.Work on client-server applications with TCP and UDP sockets, and get to know real-world communication patterns.Get hands-on with IP addressing, subnets, and routing through practical demonstrations and progressive programming exercises.Put core application protocols like HTTP, FTP, SMTP, IMAP, and DNS in C++.Take advantage of NETCONF and C++ to automate configuration tasks across network devices efficiently and consistently.Employ asynchronous programming, multithreading, and event-driven models to handle high-performance networking scenarios.Program your devices to automatically update their firmware, adjust their settings, and recover if something goes wrong.Combine Nagios monitoring with custom C++ checks for fault, performance, and security visibility.Simulate and test networks using NS-3 and diagnostic tools for real-time problem solving.Table of ContentIntroduction to Networking and C++Understanding TCP and UDPNetwork Interfaces and AddressingApplication Layer ProtocolsVPNsWireless NetworksAsynchronous ProgrammingNetwork Testing and SimulationNetwork Configuration ManagementNetwork Monitoring

9 特價2394
立即代訂
下次再買

Python Networking 101, Second Edition

Gitforgits 出版
2025/10/06 出版

If you're a developer getting into networking for the first time or an IT pro looking to build practical automation skills, this second edition gives you a clear and structured path to master essential networking concepts and become a confident, hands-on Python network administrator. If you're looking to automate repetitive networking tasks, build tools for infrastructure, or become a network administrator, you'll find this book teaching all the skills, structure, and mindset to make it happen.You'll start off by getting the basics of Python down and then quickly move on to TCP, UDP, and socket programming. You'll work with protocols like HTTP, FTP, DNS, and email, and you'll use Python to automate everyday network tasks. As you read on, you'll dive into modern network automation using Netmiko, Paramiko, and NAPALM, manage asynchronous tasks with AsyncIO, and set up monitoring and analysis workflows through SNMP, ping3, iperf3, and Locust. You'll also use SimPy to simulate networks, program firewalls, scanning, encryption, and VPNs. You'll also get to work on configuration management and orchestration using Ansible. This will teach you how to automate server and network setups, manage software lifecycles, enforce standards, and integrate Python for advanced logic.This book is all about clarity and practicality, using simple, easy-to-follow examples that work in the real world. It's not meant to deal with complicated business scenarios, but it does cover the most important, routine and common jobs of network programming.Key FeaturesLearn the basics of Python syntax and data structures for network automation.Get the hang of TCP, UDP, and socket programming for real communication tasks.Practice your skills with HTTP, FTP, DNS, and email protocols using real-world Python scripts.Set up SSH connections and device configurations using Netmiko, Paramiko, and NAPALM.Take charge of asynchronous network operations with Python's AsyncIO library.Keep an eye on, look at, and test networks using SNMP, ping3, iperf3, Locust, and SimPy.Make your network security stronger by using firewalls, scanning, SSL/TLS, and VPN configurations.Take advantage of the NAPALM and Git integration to automate your configuration management and version control.With Ansible playbooks, roles, and automation workflows, you can orchestrate server and network setups.Table of ContentIntroduction to Python and NetworkingTCP, UDP and Socket ProgrammingWorking with Application LayerExploring Network AutomationNetwork Monitoring and AnalysisNetwork Security and PythonWorking with APIs and Network ServicesNetwork Programming with AsyncIONetwork Testing and SimulationNetwork Configuration ManagementAnsible and Python

9 特價2394
立即代訂
下次再買

Practical Purple Teaming

No Starch Press 出版
2025/09/30 出版

Real-world threats demand real-world teamwork. If you're tired of red team reports gathering dust--or defensive teams being left in the dark--this book is for you. Practical Purple Teaming gives you a hands-on blueprint for running collaborative security exercises that improve detection, build trust, and expose real gaps before attackers do. You'll learn how to emulate adversaries using tools like Atomic Red Team, MITRE Caldera, and Mythic, and you'll guide defenders toward actionable insights using real logs, alerts, and frameworks like MITRE ATT&CK, the Cyber Kill Chain, and the Pyramid of Pain. If you're running your first purple team exercise or trying to scale a repeatable program, this book will show you how to move from ad hoc simulations to a sustainable, integrated strategy. You'll learn how to: Design purple team exercises that produce measurable improvements Emulate attacks using threat intel and adversary simulation toolsCollect telemetry and analyze coverage using open source platformsAutomate labs with Splunk's Attack Range and other free resourcesBuild a sustainable, cross-functional purple teaming function within your organizationWhether you're red, blue, or somewhere in between, this book will help you test smarter, detect faster, and collaborate better. If you've ever finished a red team engagement and wondered what actually changed, this is your playbook.

9 特價2052
立即代訂
下次再買

The Propagation of Misinformation in Social Media

2025/09/25 出版

There is growing awareness about how social media circulate extreme viewpoints and turn up the temperature of public debate. Posts that exhibit agitation garner disproportionate engagement. Within this clamour, fringe sources and viewpoints are mainstreaming, and mainstream media are marginalized. This book takes up the mainstreaming of the fringe and the marginalization of the mainstream. In a cross-platform analysis of Google Web Search, Facebook, YouTube, Reddit, Twitter, Instagram, 4chan and TikTok, the authors found that hyperpartisan web operators, alternative influencers and ambivalent commentators are in ascendency. The book can be read as a form of platform criticism. It puts on display the current state of information online, noting how social media platforms have taken on the mantle of accidental authorities, privileging their own on-platform performers and at the same time adjudicating between claims of what is considered acceptable discourse.

9 特價7956
貨到通知
下次再買

Practical IoT Solutions for Students Using Popular Development Platforms

Eliva Press 出版
2025/09/23 出版

Practical IoT Solutions for Students Using Popular Development Platforms: Arduino, Raspberry Pi and NodeMCU is your gateway to understanding the dynamic and rapidly evolving world of IoT. Designed for students and enthusiasts, this book provides a hands-on approach to learning, exploring practical applications of IoT using popular platforms like Arduino Uno, Raspberry Pi, and NodeMCU. This book bridges the gap between theory and practice, empowering readers to create innovative solutions for real-world problems. With step-by-step explanations, detailed projects, and simplified concepts, it introduces the fundamentals of IoT, sensor integration, cloud connectivity, and automation.

9 特價2565
立即代訂
下次再買

AHS Internet Password Logbook

2025/09/23 出版

Remembering internet passwords and usernames has never been more beautiful! Easily store this precious information all in one place with this alphabetically tabbed logbook. This handy and essential record-keeping tool from the foremost authority in North American gardening, the American Horticultural Society, is accented by historical botanical illustrations and filled with hundreds of entry templates that make it easy to track important device logins, passwords, usernames, URLs, recovery keys, and wireless network details. Gone are the days of scribbling these essential details on sticky notes that get lost or thrown away! The cut-away alphabetical tabs make the recorded information easy to find, and quick tips for creating strong passwords and keeping your information safe on the internet are also found inside. Included are places to record: 400 different websites and their usernames and passwords (with room for three password changes each) Login information and recovery keys for 6 different devices, including phones, tablets, or computersFactory-default and user-defined usernames and passwords for wireless networks A blank lined page for jotting down additional notesA removable title band and the botanical-accented cover mean others won't know that important information is housed in this pretty little book, making it as discreet as it is convenient. A perfect gift for any flower lover or for yourself! **Also in this series of giftable books from the American Horticultural Society is the AHS Weekly Planner.

9 特價444
立即代訂
下次再買

They Lied About SEO

Vizzybrand 出版
2025/09/19 出版

They Lied About SEO is the no-fluff, real-world guide for small business owners, content creators, and entrepreneurs who are sick of being invisible online.You've probably been told that SEO is all about keywords, backlinks, and technical tricks. You've probably also been told that to get seen, you'll need to run ads, hire an agency, or learn how to "play the algorithm." But after spending time, money, and energy on things that don't work, you're still not showing up where it matters. That's not your fault.They lied to you.In this raw and revealing book, serial entrepreneur and marketing expert Eric F Gilbert exposes the truth behind the SEO industry-and why it's rigged to keep you confused and paying. He's helped hundreds of real people build real visibility without spending a fortune, writing code, or waiting months for results.This book breaks down how online visibility really works in today's AI-driven internet, and shows you how to become the authority people trust and the name they see everywhere-without needing to master tech or chase ever-changing search engine updates.You'll discover: Why traditional SEO advice fails most small business ownersHow to build digital visibility without ads, hacks, or complexityA proven strategy that leverages real conversations, expert positioning, and omnipresenceHow to dominate your niche by becoming the one people see, trust, and buy fromWhether you're just starting out or you've been spinning your wheels for years, They Lied About SEO will finally give you the clarity and strategy you need to get found-and get paid.Stop wasting time. Stop guessing. Stop feeding the machine. It's time to own your visibility.

9 特價615
立即代訂
下次再買

Security for Everyone

Laura,Bell  著
Holloway 出版
2025/09/19 出版

Securing your business can be daunting, especially when you're small. That's why Security for Everyone offers low-cost, scalable solutions to securing your startup or growing business. It will test your personal security assumptions and practices, which will set you up to lead security for an ever-growing team. You'll learn frameworks for understanding security at different stages of your business, and be guided on a practical journey from secure individual to security leader.Security for Everyone focuses on practical, flexible, step-by-step, affordable approaches that can scale to suit your situation and needs, in language non-technical folks can understand.You'll learn: Why security matters and how it applies to our business, systems, data, and people.How to protect your own data and key accounts online (such as email and social media)-not just for your own benefit but for the safety of those you care about.How to protect your small business and the key data and tools you rely on to operate-from your website to your email-whether you are protecting yourself or working with a service provider.How to protect your startup and maximize your chance of survival as you take big risks and innovate-from vulnerability management as the technical environment team grows, to communicating security with your customers.How to scale your security for your growing organization-moving your security approach from foundations, to weaving security through your day to day operations and assessing the threats you face as your strategy changes.

9 特價1436
立即代訂
下次再買

Security for Everyone

Laura,Bell  著
Holloway 出版
2025/09/19 出版

Securing your business can be daunting, especially when you're small. That's why Security for Everyone offers low-cost, scalable solutions to securing your startup or growing business. It will test your personal security assumptions and practices, which will set you up to lead security for an ever-growing team. You'll learn frameworks for understanding security at different stages of your business, and be guided on a practical journey from secure individual to security leader.Security for Everyone focuses on practical, flexible, step-by-step, affordable approaches that can scale to suit your situation and needs, in language non-technical folks can understand.You'll learn: Why security matters and how it applies to our business, systems, data, and people.How to protect your own data and key accounts online (such as email and social media)-not just for your own benefit but for the safety of those you care about.How to protect your small business and the key data and tools you rely on to operate-from your website to your email-whether you are protecting yourself or working with a service provider.How to protect your startup and maximize your chance of survival as you take big risks and innovate-from vulnerability management as the technical environment team grows, to communicating security with your customers.How to scale your security for your growing organization-moving your security approach from foundations, to weaving security through your day to day operations and assessing the threats you face as your strategy changes.

9 特價1197
立即代訂
下次再買

Future-Ready with Generative AI

CRC Press 出版
2025/09/16 出版

For the first time in history, the most powerful artificial intelligence (AI) works through language itself: The same medium humans use to think and communicate. Dr Michael Kollo reveals why this makes AI uniquely accessible to everyone, and how to harness this linguistic revolution for work and life.This book thoughtfully explores why language-based AI represents something fundamentally different from previous automation, examining both imagined fears and genuine possibilities for workforce transformation. It explains why institutional change takes time despite impressive capabilities, how AI systems are quietly becoming our digital confidants, and why we may eventually come to resent the very technologies we initially embrace. These concepts are explained with care through real-world examples and practical frameworks, whilst companion fictional stories help different audiences understand the emotional reality of technological change. From a software developer orchestrating AI agents to a postal worker finding unexpected digital companionship, these narratives illuminate what it actually feels like to live through this transformation. The book addresses both the remarkable potential of conversational AI and its capacity for subtle manipulation, providing readers with the understanding needed to engage thoughtfully with systems that speak our language.Future-Ready with Generative AI: Skills, Mindsets and Stories in the Age of AI transforms AI from intimidating complexity into intuitive collaboration. Because these systems work through language, everyone can learn to use them effectively. Readers wil gain practical wisdom for leveraging conversational AI while preserving human creativity, relationships, and independent thinking.

9 特價2514
立即代訂
下次再買

Grey Area

Vinny,Troia  著
Wiley 出版
2025/09/15 出版

A compelling, first-hand account of the dark web, from its underground ecosystem, to the people responsible for committing data breaches and leaking data, 21st century's most consequential data breaches, the responses to those attacks, and the impact of dark web data and intelligence gathering and can have in the defense and security of our nation. In Grey Area, veteran hacker and cybersecurity investigations expert Vinny Troia offers an unfiltered, first-person look into the evolving relationship between open-source intelligence (OSINT) and the dark web data ecosystem. Drawing from years of hands-on experience in digital forensics, dark web investigations, and adversarial engagement, Troia explores how publicly available and commercially available information--PAI and CAI--are rapidly becoming the backbone of modern intelligence operations, and how a human intelligence network of known cyber criminals helped identify and stop one of the largest data breaches in known history. This book examines the legal, operational, and ethical dimensions of collecting and exploiting data from the darkest corners of the internet, including leaked databases, breached credentials, and hidden criminal networks. It breaks down how to discover, process, validate, and operationalize this data in real-world contexts--from attribution and threat actor profiling to national security use cases. You'll explore the evolution of OSINT within the Department of Defense and the Intelligence Community through exclusive, first-hand accounts from senior officials who helped define its path. You'll also learn how AI and automation tools are being used to validate data at scale, detect disinformation, and supercharge open-source investigations. The book also covers how data is stolen and what happens to it after the theft. Through his direct account as Reddington, Troia provides actual unedited conversations with the cyber criminals responsible for a hack targeting more than 160 companies, including his own interactions leading to the hack, the extortion negotiation and responses with each of the effected organizations, and how the hackers were ultimately brought to justice. From discussions of the legal grey areas of data collection, ransom negotiations, and a first-hand perspectives of his interaction with well-known hackers, Grey Area is a compelling and honest account of the realities of the dark web, data theft, and ways in which the intelligence community should be leveraging these methods to help strengthen our national security. Inside the book: Blow-by-blow accounts of one of the largest data breaches in recorded history Interviews and commentary from high level officials at the CIA, ODNI, DIA, and DOD. Informed, insightful commentary on how cybersecurity professionals are using dark web open-source intelligence to strengthen national security, and our country's defenses against hackers and foreign adversaries. Revealing interviews with experienced hackers who explain a variety of approaches, philosophies, and strategies for combatting and recovering from data breaches Grey Area is essential reading for cybersecurity professionals, intelligence analysts, investigators, and policy leaders navigating the complex intersection of dark web data, national security, and open-source intelligence. Through real-world case studies and insider accounts, it delivers actionable insight into the future of data-driven investigations, threat attribution, and the expanding role of OSINT in modern intelligence operations.

9 特價1710
立即代訂
下次再買

The Internet Stack

Amrit,Tiwana  著
Mit Press 出版
2025/09/15 出版

An accessible journey through the seam that connects the digital world of the Internet to our physical world. The stack--the conduit between our digital and physical worlds--is the elusive, mysterious, and least-understood part of the Internet. In the five seconds it took you to read that, 100 quadrillion bits of data just whizzed through the stack. Our metaphors--cloud, virtual, cyber--blind us to the incredible reality: The Internet is a physical thing: dingy, wet, and rusty. In The Stack, Amrit Tiwana takes us on a journey through this gritty reality. The book begins with its breathtaking physical layer, laden with geography, luck, and history dating to the Civil War era. Then it shows us how most Internet traffic flows deep undersea as laser beams, not up in the "cloud" via satellites. It goes on to explore how the stack constructs and deconstructs "packets" layer-by-layer, how these packets travel over rickety paths, and how the stack can assimilate stuff that has yet to be invented. Finally, it discusses how we construct resilience out of fragile parts and how quantum computing might affect the stack.

9 特價648
貨到通知
下次再買

Cybersecurity For Beginners

Ayhma,Awther  著
2025/09/14 出版

Gain mastery over Cybersecurity Essentials without being overwhelmed by technical jargon or prior tech experience!Are you curious about the rapidly evolving world of cybersecurity but find yourself lost in a sea of acronyms and technical vocabulary? Do you want to protect your personal information online but fear making mistakes that could compromise your security? Are you looking to break into a cybersecurity career but unsure where to begin? If you've found yourself nodding along, you're not alone. Many individuals, eager to explore technology and protect themselves in a digital world, grapple with similar concerns. However, there's no need to feel daunted. Discover how "Cybersecurity For Beginners" can empower you to navigate this exciting field with confidence and ease. Here's just a taste of what you can unveil inside this enlightening guide: The beginner-friendly guide to cybersecurity, designed specifically for those with minimal technical background.Five fundamental principles of cybersecurity you need to know to safeguard your digital life.A complete mapping of common cyber threats like phishing, malware, and ransomware-and how to shield yourself against them.How to fortify your passwords without creating cumbersome combinations you'll forget.Explore various career paths in cybersecurity with insights from diverse roles like SOC analyst and penetration tester.Step-by-step instructions on setting up a VPN and using two-factor authentication for enhanced protection.Learn the practical application of cybersecurity measures through real-world case studies.Eight game-changing security habits that elevate your personal safety in the digital realm.The importance of the CIA triad and its role as the cornerstone of all cybersecurity practices.How current trends and technologies impact cybersecurity and what you must watch out for.Tips for avoiding common cybersecurity pitfalls to protect your home network without worry....and much more! Think you need to be a tech expert to understand this book? Think again! This guide is crafted with clarity and real-world practicality at its core, using accessible language with visual aids to make complex ideas relatable and easy to grasp. In this rapidly evolving digital age, keeping up with cybersecurity shouldn't be a daunting task but an empowering journey. Whether you're starting from scratch or looking to refine your skills, this book provides a comprehensive, up-to-date resource tailored for beginners. Embrace this opportunity to get ahead in cybersecurity and safeguard your digital future with confidence. Scroll up and click "Add to Cart" to begin your journey now! See you on the inside.

9 特價751
立即代訂
下次再買

AI and ADA

2025/09/10 出版

Preface The book's Preface places the current AI explosion in the context of other technological cataclysms and recounts the author's personal (and not always deadly serious) AI journey. Chapter One: "Extracting the Essence: Toward Machine Translation of Literature" This 2019 essay rashly inquired whether artificial intelligence (AI) and machine translation (MT) might eventually be applied to literary translation. Such translation strives to somehow preserve the essence of a work while carrying it over to a different language and culture and giving it rebirth there. To recognize that essence, the translator must accurately capture the meaning of the original; appreciate its metaphors, connotations, register, references, and other abstract or associative factors; and choose among available target language expressions by exercising esthetic judgments. Computers, however, have until recently remained incapable of such accuracy, abstraction, and judgment. We revisited these shortfalls in light of developments in MT and AI. We teased apart several separable aspects of literary translation - literal meaning, meter, rhyme, and the abovementioned associative elements - with reference to arguments about Vladimir Nabokov's hyper-literal translation of Pushkin's poem Eugene Onegin. Prompted by this debate, we came to analyze translation as an optimization problem: because it will often prove impossible to perfectly convey all aspects or essences of a text in a single translation, the translator must search for some optimal compromise. Then we discussed several avenues for improvement in MT which could help to extract these aspects of a text's essence - first, those which might enhance textually grounded MT (i.e., MT trained on text only), leading to delivery of high-quality literal translations; and second, those related to perceptually grounded MT (i.e., MT trained on simulated perception, e.g. of audiovisual input, as well as text), which might extract more abstract or associative elements of a text. We suggested that recognition of categories would prove central to the essence extraction sought by translators. As this categorization improves, MT should increasingly support literary, and thus cultural, preservation. However, the deepest artificial esthetic judgments will await artificial emotion. Chapter One concluded with two appendices, the first sampling numerous competing translations of Pushkin verses and the second displaying widely varying translations of a short French poem. Chapter Two: "Toward an Artificial Nabokov" Chapter One inquired whether artificial translation of literature might be at all possible. The cautious conclusion was that while high-quality literal translation might be achievable through foreseeable development of current techniques, artistic translation would await artificial emotion, a more distant prospect. This 2021 sequel went on to ask whether an artificial intelligence might eventually gain the ability to actually create works of literary art. To throw literary consciousness into the sharpest relief, we took as exemplar an author known for a kind of hyper-consciousness: Vladimir Nabokov. To be sure, the suggestion that artworks combining Nabokov's superhuman intricacy and wholly human depth could be authored by a collection of switches would horrify this transcendent author, and does seem to fly in the face of everything that is most human. But while we are concerned with what machines might do, our more fundamental concern is to understand the human thoughts and feelings to which machines might aspire; and this understanding, promising to bridge the gap between C.P. Snow's two cultures, is finally coming within reach. In our literary context, Nabokov scholarship provides many specific examples - in Ada: or Ardor, Pale Fire, and other works - of the author's hyper-conscious artistic techniques: glorying in memory; repetition to establish themes and motifs; allusion to wide-ranging w

9 特價3762
立即代訂
下次再買
頁數1/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing