0101~0102_天獄園2
1231~0102_金網寒假動漫節

英文書 > 全部商品

ISO/IEC 27001 Meets the SOX 404 Risk Assessment - A Cross-Domain Risk Reference

Lulu.com 出版
2025/06/12 出版

A practical reference for bridging ISO/IEC 27001 and SOX 404. This book offers a clear, structured mapping between information security controls and financial reporting requirements. Designed for professionals navigating both domains, it includes crosswalk tables, annex summaries, and a glossary to support dual compliance. The third in a trilogy alongside the CRA and NIS2 volumes, it serves as a compact yet comprehensive compass for CISO, audit, and GRC teams working across governance frameworks.

9 特價7167
立即代訂
下次再買

The Zero-trust Paradigm

Now Publishers 出版
2025/06/12 出版

Existing measures aimed at securing network perimeters have demonstrated insufficiency in preventing breaches within an organization's infrastructure. This inadequacy stems from the escalating resource capabilities of adversaries and the increasing sophistication of multi-step attack strategies, rendering breaches feasible. Zero Trust Architecture (ZTA), also known as perimeter-less security, is a recent paradigm that challenges the conventional notion of network security by considering both internal and external networks as potentially compromised and that threats exist at all times in the network. The notion of ZTA has been introduced as a fine-grained defense approach. It assumes that no entities outside and inside the protected system can be trusted and, therefore, requires articulated and high coverage deployment of security controls. However, ZTA is a complex notion that does not have a single design solution, rather, it consists of numerous interconnected concepts and processes that need to be assessed prior to deciding on a solution.In this monograph, the authors cover the principles and architectural foundations of ZTA following the guidelines by NIST, and provide a detailed analysis of ZTA proposed by research and industry. The monograph also describes an approach for the automatic generation of Zero Trust (ZT) policies based on application communication requirements, network topology, and organizational information. This approach was designed to meet a critical need of ZTA, that is, the generation and implementation of a large number of fine-grained policies. Finally, the monograph discusses several research directions, including the incorporation of threat intelligence into ZT networks and the use of large language models.

9 特價4361
加入購物車
下次再買

Considerate Content

Lulu.com 出版
2025/06/12 出版

Rebekah Barry draws on her experience of doing research with people with wide-ranging needs, showing that accessibility and inclusion are not just tick boxes on a compliance chart. Instead, being considerate of people's different needs is central to making content better for everyone. Whether you're an interaction designer, content creator, policy maker, or educator, this book guides you through how to make your content more inclusive and accessible, with a focus on neurodivergence and health conditions.

9 特價1188
立即代訂
下次再買

Webwork in Action

2025/06/12 出版
9 特價2063
貨到通知
下次再買

Modern Communication with Social Media

Mamta,Dalal  著
2025/06/11 出版

This book explores the evolution of communication, communication media, and covers social media in detail. The book examines some of the most popular social media platforms available today. The book begins with exploring the evolution and history of communication and communication media through the centuries. The book then moves on to introduce social media in detail. It describes some of the most popular social media platforms available today. The book also covers an analysis of various social media management tools. The second edition of the book improves upon the existing content with newer tools and platforms and removes outdated content. It also touches upon cutting-edge topics such as Artificial Intelligence (AI) and its impact on social media, ethics and responsibility in social media, measurement and analytics, and social media marketing and advertising.By the end of this book, readers would be familiar with basics of communication concepts, social media and its features and benefits, working with popular social media platforms such as X, Instagram, Facebook, etc. Readers will also gain insights into advanced concepts like social media ethics, analytics, marketing and the role of AI in shaping the digital landscape. WHAT YOU WILL LEARN● Identify the need for communication.● Trace the history and growth of communication.● Understand the basics of communication.● Identify various forms and types of communication as well as communication channels.● Identify the features and benefits of social media.● Understand the basics of social media platforms.● Gain familiarity with popular social media platforms.● Utilize social media management tools to manage social media platforms.WHO THIS BOOK IS FORThis book is designed to cater to all kinds of audiences, including undergraduates, graduates, and others who are looking to familiarize themselves with communication concepts and social media.

9 特價2193
立即代訂
下次再買

Reengineering Cyber Security Process

de Gruyter 出版
2025/06/11 出版

In today's rapidly evolving information technology landscape, cyber-attacks on company assets and IT systems are becoming increasingly frequent and varied. This book focuses on such security breaches, originating from diverse sources. The book explores the complexities of security attacks and the growing number of vulnerabilities, emphasizing the importance of implementing high-quality information security practices within organizations. It introduces "Reengineering Cyber Security Process: Quality Management", a practical methodology for analyzing various information security components within an organization to develop a comprehensive quality information security management program. This book is valuable for a wide range of professionals in the information security community, including CIOs, CEOs, CISOs, managers, IT staff, professional cybersecurity staff, and end-users. It includes relevant examples and applications, offering a fresh perspective on Cyber Security Quality Management.

9 特價8454
立即代訂
下次再買

Deep Learning Based Solutions for Vehicular Adhoc Networks

Springer 出版
2025/06/10 出版
9 特價13049
貨到通知
下次再買

Advances in the Internet of Things

Qusay,Hassan  著
CRC Press 出版
2025/06/10 出版

Many reports estimate that in 2024, the number of IoT devices exceeded 18 billion worldwide, with predictions to reach 40 billion by 2033. The main objective of this peer-reviewed book is to capture the state-of-the-art in IoT and cover some of its challenges, solutions, and emerging technologies.

9 特價6786
立即代訂
下次再買

An Essay On The Art Of Decyphering

John,Davys  著
2025/06/09 出版

An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breaking. This edition includes a previously unpublished discourse by Dr. Wallis, sourced from his original manuscript housed in the Public Library at Oxford. Authored by John Davys, the essay provides insights into historical methods of decipherment, offering a valuable resource for those interested in the history of secret communication. The book explores the techniques and challenges involved in decoding encrypted messages, shedding light on a fascinating aspect of scientific and linguistic history.This work is essential for cryptographers, historians of science, and anyone curious about the art and science behind deciphering hidden messages. Discover the secrets of the past with An Essay On The Art Of Decyphering.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

An Essay On The Art Of Decyphering

John,Davys  著
2025/06/09 出版

An Essay On The Art Of Decyphering delves into the intricate world of cryptography and code-breaking. This edition includes a previously unpublished discourse by Dr. Wallis, sourced from his original manuscript housed in the Public Library at Oxford. Authored by John Davys, the essay provides insights into historical methods of decipherment, offering a valuable resource for those interested in the history of secret communication. The book explores the techniques and challenges involved in decoding encrypted messages, shedding light on a fascinating aspect of scientific and linguistic history.This work is essential for cryptographers, historians of science, and anyone curious about the art and science behind deciphering hidden messages. Discover the secrets of the past with An Essay On The Art Of Decyphering.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價732
立即代訂
下次再買

Wireshark Cookbook

2025/06/07 出版

���� Unlock the Power of Packet Analysis with the Wireshark Cookbook Series! ��������️]♂️Are you ready to transform from a network novice into a Wireshark wizard? The Wireshark Cookbook: Packet Analysis Bible is your ultimate four-book toolkit, covering every stage of your CLI journey-from basic captures to enterprise-scale automation. Whether you're troubleshooting latency, hunting cyber threats, or automating complex pipelines, these volumes have you covered! ������������ Book 1: Command-Line Essentials for Packet Analysis BeginnersStep-by-step commands for DNS, HTTP, and ARP troubleshooting ����️Extracting IPs, ports, and protocols ����Hands-on tasks to build confidence at the shell prompt���� Book 2: Intermediate CLI Techniques and Custom FiltersCrafting logical and regex filters for TLS, VoIP, DNS-over-HTTPS ����Automating packet summaries in shell pipelines ⚙️Real-world examples to isolate performance or security issues���� Book 3: Advanced Command-Line Scripting and AutomationScheduling hourly captures with cron jobs ⏰Parsing JSON/CSV output into Elasticsearch or databases ����Custom Lua dissectors for proprietary protocols ����Integrating TShark with Zeek, Slack alerts, and more �������� Book 4: Expert-Level CLI Mastery and Performance TuningKernel parameter tweaks (net.core.rmem_max, netdev_max_backlog) ����️CPU affinity, interrupt coalescing, and NUMA considerations ����️Multi-threaded workflows & Spark/Elasticsearch integration ����Storage strategies for terabyte-scale archives and Parquet indexing ����️���� Grab Your Copy Today!Don't let packet analysis intimidate you-master it, automate it, and scale it with the Wireshark Cookbook: Packet Analysis Bible series! �������� Order now and join thousands of network professionals who trust the Wireshark Cookbook to solve real-world network challenges.���� Happy capturing! ����

9 特價1440
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/07 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4697
立即代訂
下次再買

Natural Language Processing and Information Retrieval

Muskan,Garg  著
CRC Press 出版
2025/06/06 出版

This book presents the basics and recent advancements in natural language processing and information retrieval in a single volume. It will serve as an ideal reference text for graduate students and academic researchers in interdisciplinary areas of electrical engineering.

9 特價3497
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/05 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價3392
立即代訂
下次再買

AI for Everyday It

2025/06/05 出版

Automate and accelerate your everyday IT tasks with instant solutions! What if you never had to write another after-incident report, piece of boilerplate code, or a performance review from scratch ever again? Use AI tools like ChatGPT, Claude, Gemini, and Copilot right, and you'll take back hours of your time--and more! AI for Everyday IT reveals how you can automate dozens of your daily IT tasks with generative AI. In AI for Everyday IT you'll learn how to: - Write effective prompts for common IT tasks - Optimize report generation, document handling, and workplace communication - Resolve IT conflicts and crises - Acquire new skills and upgrade your resume - AI for help desk, database administration and systems administration - Incorporate AI into DevOps processes and create AI-powered applications - Simplify time-consuming people management tasks In this hands-on guide, automation experts Chrissy LeMaire and Brandon Abshire show you how AI tools like ChatGPT have made their lives a million times easier, and how they can do the same for you. You'll find proven strategies for using AI to improve help desk support, automate sysadmin and database tasks, aid with DevOps engineering, handle managing IT teams, and dozens more time-saving and quality-improving hacks. Foreword by Nitya Narasimhan. About the technology Have you lost days sifting through logs to find a latency issue? AI can do it in seconds! Need to update your documentation? Mere moments for AI. Are you writing scripts, designing data recovery strategies, and evaluating network designs? AI can handle it all--if you know how to use it. About the book AI for Everyday IT shows you exactly how AI can transform support desk operations, root cause analysis, disaster recovery planning--even writing professional emails when you're too furious to be nice! This instantly-useful guide has time-saving techniques for all IT pros--from devs and DBAs to technical writers and product managers. Each relatable example is fully illustrated with the prompts and problem formulation strategies, along with interesting insights and anecdotes from authors Chrissy Lemaire and Brandon Abshire. What's inside - Document handling and workplace communication - Database administration and development - DevOps engineering and AI powered apps - People management and career planning About the reader Whether you're working in operations, development, management, or security, you'll love these productivity hacks for generative AI. No previous AI experience required. About the author Chrissy LeMaire is a dual Microsoft MVP and GitHub Star, the creator of dbatools, and author of the Manning book Learn dbatools in a Month of Lunches. Brandon Abshire has spent over twenty years in IT, including roles at a leading Fortune 500 semiconductor and telecommunications company and multiple top-ranked US hospital systems. Table of Contents Part 1 1 Artificial intelligence in IT 2 Chatbots: Tasks and tips 3 Basic intelligence 4 Prompt engineering and problem formulation 5 Prompts in action 6 Document handling 7 Emails and instant messaging in the workplace Part 2 8 IT support and service desk 9 Systems administration 10 Database administration and development Part 3 11 Code assistants and development tools 12 AI in DevOps engineering 13 Building AI-powered applications Part 4 14 Conflict resolution and crisis management 15 Management essentials 16 Management interventions 17 Career advancement A Local AI models: An accessible alternative B OpenAI GPT Actions Get a free eBook (PDF or ePub) from Manning as well as access to the online liveBook format (and its AI assistant that will answer your questions in any language) when you purchase the print book.

9 特價2294
立即代訂
下次再買

Mastering Network Flow Traffic Analysis

2025/06/05 出版

DESCRIPTION The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, privacy, ease of implementation, and effectiveness, is already playing a key role in the field of network security. Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems.CISOs, CIOs, network engineers, SOC analysts, secure DevOps, and other people eager to learn, will get sensitive skills and the knowledge to improve the security of the networks they are in charge of, that go beyond the traditional packet filtering approach.WHAT YOU WILL LEARN● Implement flow analysis across diverse network topologies, and identify blind spots.● Enable flow export from virtualized (VMware, Proxmox) and server environments.● Ingest and structure raw flow data within Elasticsearch and Clickhouse platforms.● Analyze flow data using queries for patterns, anomalies, and threat detection.● Understand and leverage the network flow matrix for security, capacity insights.WHO THIS BOOK IS FORThis book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.

9 特價2193
立即代訂
下次再買

JavaScript for Kids

2025/06/05 出版

Welcome to the book "JavaScript for Kids: Start your Coding Adventure". This book is your introduction to the world of JavaScript. It's your first step towards developing websites and mobile applications. With JavaScript, you can turn your ideas into reality. Learning should be fun, so you will feel like you are reading a story. By the end of this book, you will have a good understanding of JavaScript. You will have taken the first steps in your modern web programming adventure. Have fun programming!

9 特價1481
立即代訂
下次再買

Responsive Design

2025/06/05 出版

Welcome to the book "Responsive Design". In this book, I'll introduce you to all the CSS functions you need to create a responsive design. By responsive design, I mean that the website adapts its styles to the display device. So your application changes its layout, alignment, font size, images and even applies different styles for different screen sizes. For example, on wide screens such as TVs, it will display horizontally, while on mobile devices it will switch to a vertical layout. The functions of Responsive CSS include modern layouts such as Flex. This includes media queries, responsive typography and responsive images. It is not possible to list every single detail of all the features in a book, because then the book would be so extensive and you would get bored reading it. There is a wealth of information everywhere. So I'll keep it simple and tell you what you need for your project and try to get you on the right track. Let's go

9 特價932
立即代訂
下次再買

Security Analysis and Formal Verification on Blockchain and its Applications

Kang,Li  著
Now Publishers 出版
2025/06/05 出版

At its core, blockchain is a distributed database that maintains a continuously growing list of records, called blocks, which are securely linked using cryptographic techniques. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data, making it virtually tamper-proof and resistant to modification. This structure ensures that once a block is added to the chain, the information it contains is immutable and can be trusted by all participants in the network. Blockchains have become an integrated part of our financial infrastructures. Being monetary yet fully automated, blockchain and its applications are unanimously deemed impracticable before undergoing necessary verification.This monograph reviews the previous attempts at verifying two fundamental properties of blockchains: correctness and security. First, it summarizes and categorizes the correctness and security flaws encountered by real-world blockchains. Second, it systematizes the development of formal verification to address the flaws in blockchains, covering the aspects of models, specifications, and techniques. Third, it unveils the progress of security analysis for mitigating the flaws, unveiling the analysis principles being followed, the flaw oracles being devised, and the detection methods being used. Finally, the monograph summarizes the remaining challenges and visions of the trend in the near future.Throughout this monograph, future blockchain verification advances are identified, especially in expanding its applicability, making specification generation easier, and discovering previously unknown vulnerabilities. By identifying gaps such as missing tools for infrastructure-level components and the difficulty of writing formal specifications, this monograph aims to motivate the development of more automated, intelligent, and practical verification frameworks.

9 特價4131
加入購物車
下次再買

Cyber Security for Next-Generation Computing Technologies

CRC Press 出版
2025/06/05 出版

This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.

9 特價3497
立即代訂
下次再買

Angular Observables and Promises

2025/06/04 出版

Welcome to the book "Angular Observables and Promises: A Practical Guide to Asynchronous Programming". In this book, I explain how to use observables and promises effectively for asynchronous programming. I show you practical scenarios and explain when you should use them and which operators you need to use. I will give you best practices with important pointers that, when used correctly, can make all the difference and have a big impact on performance. There are also things you should be aware of and avoid when working with observables, otherwise performance can be affected. By the end of this book, you will be able to use Observables and Promises in your Angular application and handle all kinds of scenarios. Let us get started.

9 特價1481
立即代訂
下次再買

Malware Narratives

Opentask 出版
2025/06/03 出版

Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behavior, especially in the pattern-oriented analysis of software logs from complex systems with millions of events, thousands of threads, hundreds of processes and modules. This is a revised and updated transcript of the Software Diagnostics Services seminar on the new application of software narratology to malware analysis.

9 特價1148
立即代訂
下次再買

Cyber Risk Management in Practice

CRC Press 出版
2025/06/03 出版

Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity.

9 特價7308
立即代訂
下次再買

Information Security Governance Using Artificial Intelligence of Things in Smart Environments

CRC Press 出版
2025/06/03 出版

The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments.

9 特價7308
立即代訂
下次再買

Mastering Deepfake Technology

2025/06/02 出版

This book offers a comprehensive exploration of the profound challenges and opportunities presented by deepfake technology across industries, society, and governance. It delves into the multifaceted impacts of synthetic media, examining its potential to reshape corporate trust, economic stability, and public discourse.

9 特價7308
立即代訂
下次再買

Metasploit Pentesting

2025/06/02 出版

���� Metasploit Pentesting: Hands-On Offensive Security Suite ����Unlock the ultimate red-team toolkit with our four-volume masterclass on Metasploit, the world's premier penetration-testing framework. Whether you're just starting or an experienced pentester, this suite delivers the skills, scripts, and strategies you need to succeed.���� Book 1 - Mastering Metasploit: From Initial Access to Advanced Payloads- Get Started Fast: Install, configure workspaces & databases - Reconnaissance Made Easy: Scan networks with db_nmap, identify hosts & services - Payload Power: Generate in-memory stagers using msfvenom - Evasion Techniques: Layered encoders, bad-char filters & reflective DLL injection"An essential primer for every aspiring hacker!" - A. Smith, Security Analyst���� Book 2 - Practical Exploitation Techniques with Metasploit Framework- Vulnerability Validation: Safe banner-grab and proof-of-concept - Core Exploits: Buffer overflows, SQLi, XSS, file inclusion & more - Hands-On Labs: Step-by-step walkthroughs, complete with commandsuse exploit/windows/smb/psexec set RHOSTS 10.0.0.5run - Real-Time Debugging: Pry, GDB & proxychains integration"Finally, a book that bridges theory & practice!" - M. Lee, Red Team Lead���� Book 3 - Real-World Penetration Testing: Hands-On Metasploit Scenarios- Complex Networks: Pivot across VLANs with autoroute & portfwd - Web 2.0 Attacks: Automated scanning, CSRF, SSRF & API abuse - Resource Scripts: End-to-end workflows in single .rc files - Post-Exploitation: Credential harvesting, persistence & cleanup"Turned our team into a well-oiled pentesting machine!" - R. Patel, Cyber Ops���� Book 4 - Custom Exploit Development and Evasion Using Metasploit- Module Magic: Build your own auxiliary & exploit modules in Ruby - Advanced Payloads: Custom encoders, in-memory loaders & HTTPS stagers - AV/EDR Bypass: Fileless execution, process hollowing & driver exploits - Automation & API: msgrpc, plugins & continuous integration"A must-have for advanced red-teamers and toolsmiths!" - E. Zhang, CTO���� Ready to Dominate Your Next Engagement? Transform your offensive security game. Add Metasploit Pentesting: Hands-On Offensive Security Suite to your toolkit today and become the pentester everyone fears.���� Get your copy now!

9 特價1440
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/02 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4697
立即代訂
下次再買

Cyber Risk Management in Practice

CRC Press 出版
2025/06/02 出版

Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity.

9 特價3131
立即代訂
下次再買

Innovations for Community Services

Springer 出版
2025/06/02 出版

This book constitutes the refereed proceedings of the 25th International Conference on Innovations for Community Services, I4CS 2025, held in Munich, Germany, during June 11-13, 2025.The 21 full papers presented in this book together with 3 short papers were carefully reviewed and selected from 55 submissions.They are organized in topical sections as follows: recognition and verification; computational intelligence; data processing; quantum computing; public sector; serious games; information security; and community challenges.

9 特價5219
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/02 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4175
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/06/02 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4175
立即代訂
下次再買

Burp Suite Hacking

2025/05/31 出版

���� BURP SUITE HACKING: FROM RECON TO EXPLOITATION ��������️]♂️�������� Master Web App Hacking in 4 Epic VolumesAre you ready to go from zero to ninja in web application hacking?Want to turn Burp Suite into your ultimate cyber weapon?This 4-book bundle is your complete roadmap to mastering offensive web security using Burp Suite - the most powerful tool trusted by hackers, bug bounty hunters, and pentesters worldwide.���� Book 1: Burp Suite Essentials - Web App Hacking from Zero to Ninja������������]����Start from scratch! Learn how to set up your hacking lab, intercept and manipulate HTTP traffic, use tools like Repeater and Intruder, and understand how web vulnerabilities work from the inside out. Perfect for beginners or those wanting a rock-solid foundation.���� Book 2: Advanced Burp - Weaponizing Your Workflow⚙️����️����Already know the basics? Time to level up. Automate scans with macros and sessions, extend Burp with custom scripts, integrate with external tools, and build blazing-fast workflows. This book turns you into a Burp power user.���� Book 3: Bug Hunter's Playbook - Real-World Exploits with Burp Suite������������Get inside the mind of a real bug bounty hunter. Discover how to find and exploit serious vulnerabilities like XSS, IDOR, SQLi, SSRF, and logic flaws in modern web apps. Learn how to report them like a pro and get paid. These aren't lab examples - they're inspired by real bugs, real rewards, and real success stories.���� Book 4: The Burp Suite Lab Manual - Hands-On Projects for Web Security Testing��������️����Knowledge is nothing without practice. This lab manual gives you full walkthroughs, projects, CTF-style challenges, and vulnerable apps to test your skills. Simulate red team ops, break login systems, abuse tokens, and build attack chains. Perfect for solo learners or team training.���� Who Is This For?✅ Aspiring ethical hackers✅ Bug bounty hunters✅ Security analysts✅ DevSecOps pros✅ Anyone serious about web security���� Why This Series?✔️ Straight to the point - no filler, no fluff✔️ Real commands, real payloads, real labs✔️ Written by hackers, for hackers✔️ Constantly updated for modern web apps����️ Whether you're chasing bounties, securing systems, or just love breaking things to understand how they work, Burp Suite Hacking: From Recon to Exploitation will equip you with the skills, mindset, and tools to own every stage of the attack chain.���� Get all 4 books and go from click to exploit like a pro.���� Your hacking journey starts NOW.������������Grab your copy today! ������������#CyberSecurity #BurpSuite #EthicalHacking #BugBounty #Pentesting #InfoSec #WebAppHacking ����️����

9 特價1440
立即代訂
下次再買

Zero Trust in Resilient Cloud and Network Architectures

Josh,Halley  著
Cisco Press 出版
2025/05/31 出版

Zero Trust in Resilient Cloud and Network Architectures, written by a team of senior Cisco engineers, offers a real-world, hands-on guide to deploying automated architectures with a focus on segmentation at any scale--from proof-of-concept to large, mission-critical infrastructures. Whether you're new to software-defined and cloud-based architectures or looking to enhance an existing deployment, this book will help you: Implement Zero Trust: Segment and secure access while mitigating IoT risks Automate Network Operations: Simplify provisioning, authentication, and traffic management Deploy at scale following best practices for resilient and secure enterprise-wide network rollouts Integrate with Cloud Security, bridging on-prem and cloud environments seamlessly Learn from Real-World Case Studies: Gain insights from the largest Cisco enterprise deployments globally This edition covers Meraki, EVPN, Pub/Sub, and Terraform and Ansible-based deployments with a key focus on network resilience and survivability. It also explores quantum security and Industrial Zero Trust, along with Cisco's latest evolutions in software-defined networking, providing exclusive insights into its enhancements, architecture improvements, and operational best practices. If you're a network, security, or automation specialist, this book is your essential guide to building the next-generation, zero-trust network.

9 特價3384
貨到通知
下次再買

6g Cyber Security Resilience: Trends and Challenges

H L,Gururaj  著
Springer 出版
2025/05/30 出版
9 特價9395
貨到通知
下次再買

Learning Go with Networking

2025/05/30 出版

DESCRIPTION Golang has emerged as a powerful language for networking, known for its efficiency and concurrency, making it ideal for building resilient and scalable network applications. This book is designed to equip networking professionals with the Golang skills needed to navigate this dynamic landscape, providing a practical guide from fundamental concepts to advanced network programming.This book systematically guides you through Golang's core features, including concurrency, generics, and error handling, before diving into essential networking principles like IP, TCP, and UDP. You will learn to develop applications, design synchronous and asynchronous APIs (with a focus on Ponzu and Keycloak), and effectively handle data using formats like JSON and XML, along with stream processing with AMQP, Kafka, and MQTT. The book explores Golang network packages for protocols such as ARP, FTP, DNS, and raw sockets. It also emphasizes performance optimization, covering I/O, caching, and database techniques, and automation strategies, including device, network, and cloud deployment, along with Cisco DevNet. Security is thoroughly addressed, covering authentication, cryptography (SSL/TLS, asymmetric/symmetric), certificate handling, and OWASP Top 10 vulnerabilities, and the book concludes with an exploration of network penetration testing techniques.By the end of this book, readers will gain a solid foundation in Golang and its application to networking, enabling them to build efficient, secure, and automated network solutions and understand the security landscape, from defensive best practices to offensive techniques.WHAT YOU WILL LEARN● Build scalable backend services using Go and its libraries.● Understand TCP/UDP networking through real Go-based examples.● Develop secure APIs with authentication and token handling.● Automate infrastructure tasks using Golang and DevNet.● Identify and fix OWASP Top 10 vulnerabilities in Go.WHO THIS BOOK IS FORThis book is for software developers, DevOps engineers, backend architects, and cybersecurity professionals who want to build scalable, secure, and efficient systems using Golang. It is ideal for anyone working in infrastructure, automation, or cloud-native development looking to sharpen their development skills in Golang with respect to network programming.

9 特價2193
立即代訂
下次再買

Cyber Security Kill Chain - Tactics and Strategies

Gourav,Nagar  著
Packt 出版
2025/05/30 出版

Understand the cyber kill chain framework and discover essential tactics and strategies to effectively prevent cyberattacksKey Features: - Explore each stage of the cyberattack process using the cyber kill chain and track threat actor movements- Learn key components of threat intelligence and how they enhance the cyber kill chain- Apply practical examples and case studies for effective, real-time responses to cyber threats- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Gain a strategic edge in cybersecurity by mastering the systematic approach to identifying and responding to cyber threats through a detailed exploration of the cyber kill chain framework. This guide walks you through each stage of the attack, from reconnaissance and weaponization to exploitation, command and control (C2), and actions on objectives. Written by cybersecurity leaders Gourav Nagar, Director of Information Security at BILL Holdings, with prior experience at Uber and Apple, and Shreyas Kumar, Professor of Practice at Texas A&M, and former expert at Adobe and Oracle, this book helps enhance your cybersecurity posture. You'll gain insight into the role of threat intelligence in boosting the cyber kill chain, explore the practical applications of the framework in real-world scenarios, and see how AI and machine learning are revolutionizing threat detection. You'll also learn future-proofing strategies and get ready to counter sophisticated threats like supply chain attacks and living-off-the-land attacks, and the implications of quantum computing on cybersecurity.By the end of this book, you'll have gained the strategic understanding and skills needed to protect your organization's digital infrastructure in the ever-evolving landscape of cybersecurity.What You Will Learn: - Discover methods, tools, and best practices to counteract attackers at every stage- Leverage the latest defensive measures to thwart command-and-control activities- Understand weaponization and delivery techniques to improve threat recognition- Implement strategies to prevent unauthorized installations and strengthen security- Enhance threat prediction, detection, and automated response with AI and ML- Convert threat intelligence into actionable strategies for enhancing cybersecurity defensesWho this book is for: This book is for cybersecurity professionals, IT administrators, network engineers, students, and business leaders who want to understand modern cyber threats and defense strategies. It's also a valuable resource for decision-makers seeking insight into cybersecurity investments and strategic planning. With clear explanation of cybersecurity concepts suited to all levels of expertise, this book equips you to apply the cyber kill chain framework in real-world scenarios, covering key topics such as threat actors, social engineering, and infrastructure security.Table of Contents- Understanding the Cyber Security Kill Chain- Reconnaissance - The Initial Breach Plan- Weaponization- Delivery- Exploitation- Installation- Command and Control- Actions on Objectives- Cyber Security Kill Chain and Emerging Technologies- Legal and Ethical Aspects of Cyber Security Kill Chain- The Future- A Proactive Approach

9 特價2065
立即代訂
下次再買

Mastering Palo Alto Networks - Third Edition

Packt 出版
2025/05/30 出版

Unlock the full potential of Palo Alto Networks firewalls with expert insights and hands-on strategies for mastering next-gen securityKey Features: - Master Palo Alto Networks firewalls with hands-on labs and expert guidance- Stay up to date with the latest features, including cloud and security enhancements- Learn how to set up and leverage Strata Cloud Manager- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Mastering Palo Alto Networks is the ultimate guide for anyone looking to become proficient in configuring and managing Palo Alto firewalls. Written by a seasoned security consultant and author with 25 years of expertise in network security, this book provides a comprehensive approach to mastering Palo Alto Networks' firewalls. If you've struggled with managing firewall policies, setting up VPNs, or integrating cloud security, this book will provide clear solutions.You'll get to grips with the fundamentals, and go through the entire process step by step-from initial setup to advanced configurations, gaining a solid understanding of both on-premise and cloud-based security solutions.Packed with practical examples and expert tips, chapters show you how to deploy and optimize firewall policies, secure your network, and troubleshoot issues effectively. With a focus on real-world applications, this guide covers essential topics like traffic management, threat prevention, VPN setup, and integration with Prisma Access for cloud security.By the end of this book, you'll have the confidence and expertise to manage even the most complex network security environments, making this a must-have resource for anyone working with Palo Alto Networks.What You Will Learn: - Set up and configure Palo Alto firewalls from scratch- Manage firewall policies for secure network traffic- Implement VPNs and remote access solutions- Optimize firewall performance and security settings- Use threat prevention and traffic filtering features- Troubleshoot common firewall issues effectively- Integrate Palo Alto firewalls with cloud services- Configure Strata Cloud Manager for network security managementWho this book is for: This book is perfect for network security professionals, IT administrators, and engineers looking to master Palo Alto firewalls. Whether you're new to network security or aiming to deepen your expertise, this guide will help you overcome configuration challenges and optimize security. Basic networking knowledge is required, but no prior experience with Palo Alto is necessary.Table of Contents- Understanding the Core Technologies- Setting Up a New Device- Building Strong Policies- Taking Control of Sessions- Services and Operational Modes- Identifying Users and Controlling Access- Managing Firewalls through Panorama- Managing Firewalls through Strata Cloud Manager- Upgrading Firewalls and Panorama- Logging and Reporting- Virtual Private Networks and Advanced Protection- Troubleshooting Common Session Issues- A Deep Dive into Troubleshooting- Cloud-Based Firewall Deployments

9 特價2294
立即代訂
下次再買

Mastering Microsoft 365 Security Technologies

2025/05/29 出版

DESCRIPTION Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape.This book will introduce readers to Microsoft security solutions. It covers Microsoft Defender, Microsoft Entra ID, and Microsoft Purview. Readers will learn how they can protect their organization across different attack vectors such as email, identity, data, endpoints, and applications. It discusses how to protect the user identities using Microsoft Entra ID, protect devices and applications using Microsoft Defender and Microsoft Sentinel, and protect organization data using Microsoft Purview. With a focus on real-world scenarios, hands-on labs, and expert guidance, cybersecurity professionals will gain a deep understanding of Microsoft security solutions and how to use them to protect their organizations from bad actors. By the end of this book, you will possess the practical knowledge and skills to design, implement, and manage a strong security posture across your organization's Microsoft infrastructure, confidently protecting identities, data, and applications from modern cyberattacks.WHAT YOU WILL LEARN● Data security and governance using Microsoft Purview information protection and DLP.● Protecting devices, identities, M365, and non-M365 applications using Microsoft Defender.● Microsoft's Zero Trust Network Access solution - secure services edge.● Manage Entra ID users, groups, RBAC, Admin Units, Protected Actions effectively.● Managing regulatory compliance and privacy.WHO THIS BOOK IS FORThis book is ideal for IT professionals and administrators seeking careers in security administration using Microsoft security technologies. Readers need foundational cloud computing knowledge (IaaS, PaaS, SaaS), basic M365 cloud and Azure familiarity, plus awareness of Zero Trust, identity and access, and platform protection.

9 特價2193
立即代訂
下次再買

A Simple Guide to Retrieval Augmented Generation

2025/05/29 出版

Everything you need to know about Retrieval Augmented Generation in one human-friendly guide. Generative AI models struggle when you ask them about facts not covered in their training data. Retrieval Augmented Generation--or RAG--enhances an LLM's available data by adding context from an external knowledge base, so it can answer accurately about proprietary content, recent information, and even live conversations. RAG is powerful, and with A Simple Guide to Retrieval Augmented Generation, it's also easy to understand and implement! In A Simple Guide to Retrieval Augmented Generation you'll learn: - The components of a RAG system - How to create a RAG knowledge base - The indexing and generation pipeline - Evaluating a RAG system - Advanced RAG strategies - RAG tools, technologies, and frameworks A Simple Guide to Retrieval Augmented Generation shows you how to enhance an LLM with relevant data, increasing factual accuracy and reducing hallucination. Your customer service chatbots can quote your company's policies, your teaching tools can draw directly from your syllabus, and your work assistants can access your organization's minutes, notes, and files. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the book A Simple Guide to Retrieval Augmented Generation makes RAG simple and easy, even if you've never worked with LLMs before. This book goes deeper than any blog or YouTube tutorial, covering fundamental RAG concepts that are essential for building LLM-based applications. You'll be introduced to the idea of RAG and be guided from the basics on to advanced and modularized RAG approaches--plus hands-on code snippets leveraging LangChain, OpenAI, Transformers, and other Python libraries. Chapter-by-chapter, you'll build a complete RAG enabled system and evaluate its effectiveness. You'll compare and combine accuracy-improving approaches for different components of RAG, and see what the future holds for RAG. You'll also get a sense of the different tools and technologies available to implement RAG. By the time you're done reading, you'll be ready to start building RAG enabled systems. About the reader For data scientists, machine learning and software engineers, and technology managers who wish to build LLM-based applications. Examples in Python--no experience with LLMs necessary. About the author Abhinav Kimothi is an entrepreneur and Vice President of Artificial Intelligence at Yarnit. He has spent over 15 years consulting and leadership roles in data science, machine learning and AI.

9 特價2294
立即代訂
下次再買

Redefining Information Security

Brian,Wagner  著
Kogan Page 出版
2025/05/29 出版

Is your security strategy keeping pace with innovation and business growth? Redefining Information Security by Brian Wagner is a strategic guide for CISOs, CIOs, CTOs and senior technology leaders looking to reposition cybersecurity as a driver of enterprise value. Going beyond reactive models, it shows how security can enable innovation, unlock agility and support long-term transformation. Bringing together leadership, implementation and cultural change, this book offers practical guidance for building resilient, business-aligned security strategies that scale. You'll learn how to: - Align security with technology roadmaps, enterprise goals and innovation agendas - Turn risk into a competitive advantage with advanced mitigation frameworks - Build a proactive, security-driven culture across functions and teams - Apply proven strategies from real-world examples - Strengthen resilience while navigating an evolving threat and tech landscape Discover how security can evolve to meet the challenges of tomorrow's digital landscape with Redefining Information Security and equip yourself with the tools to lead securely and strategically. Themes include: security strategy, digital transformation, risk leadership, cybersecurity culture, enterprise architecture, innovation enablement

9 特價2276
立即代訂
下次再買

Human-Computer Interaction

Springer 出版
2025/05/29 出版

This seven-volume set constitutes the refereed proceedings of the Human Computer Interaction thematic area of the 27th International Conference on Human-Computer Interaction, HCII 2025, held in Gothenburg, Sweden, during June 22-27, 2025. The HCI Thematic Area constitutes a forum for scientific research and addressing challenging and innovative topics in Human-Computer Interaction theory, methodology and practice, including, for example, novel theoretical approaches to interaction, novel user interface concepts and technologies, novel interaction devices, UI development methods, environments and tools, multimodal user interfaces, emotions in HCI, aesthetic issues, HCI and children, evaluation methods and tools, and many others.

9 特價4175
貨到通知
下次再買

Cracking

2025/05/29 出版

���� Unleash Your Inner Hacker with "Cracking: Red Team Hacking"! ����️����Are you ready to dive deep into the world of offensive security? Cracking: Red Team Hacking is your ultimate guide to mastering the four powerhouse pentesting distributions: ���� Kali Linux - The industry standard for penetration testing, loaded with Metasploit, Nmap, Burp Suite, and hundreds more tools. Learn how to configure, customize, and conquer every engagement.���� Parrot OS - A nimble, privacy-first alternative that balances performance with stealth. Discover built-in sandboxing, AnonSurf integration, and lightweight workflows for covert ops.����️ BackBox - Ubuntu-based stability meets pentest prowess. Seamlessly install meta-packages for web, wireless, and reverse-engineering testing, all wrapped in a polished XFCE desktop.⚔️ BlackArch - Arch Linux's rolling-release power with 2,500+ specialized tools at your fingertips. From RFID to malware analysis, build bespoke toolchains and automate complex workflows.Why You Need This Book ����Hands-On Tutorials: Step-by-step guides-from initial OS install to advanced exploit chaining-that you can follow in real time.Custom Toolchains: Learn to curate and automate your perfect toolkit with Docker, Ansible, and Packer recipes.Real-World Scenarios: Walk through cloud attacks, wireless exploits, and container escapes to sharpen your red team skills.OSINT & Social Engineering: Integrate reconnaissance tools and phishing frameworks for full-spectrum assessments.Persistence & Post-Exploitation: Master C2 frameworks (Empire, Cobalt Strike, Sliver) and implant stealthy backdoors.What You'll Walk Away With ����Confidence to choose the right distro for every engagementVelocity to spin up environments in minutesPrecision in tool selection and workflow automationStealth for covert operations and anti-forensicsExpertise to beat blue team defenses and secure real-world networks���� Order Today and start cracking the code of modern security! ����✨

9 特價1165
立即代訂
下次再買

Where Matters

Ali,Youssef  著
CRC Press 出版
2025/05/28 出版

In "Where Matters," this vision becomes reality through Care Traffic Control (CTC), a revolutionary framework that brings the precision and reliability of aviation traffic control to healthcare operations.

9 特價3131
立即代訂
下次再買

Where Matters

Ali,Youssef  著
CRC Press 出版
2025/05/28 出版

In "Where Matters," this vision becomes reality through Care Traffic Control (CTC), a revolutionary framework that brings the precision and reliability of aviation traffic control to healthcare operations.

9 特價7308
立即代訂
下次再買

Cisa Certified Information Systems Auditor Practice Tests

Wiley 出版
2025/05/27 出版

Improve your understanding of every CISA exam domain and objectives to further your career in information security auditing CISA Certified Information Systems Auditor Practice Tests provides essential and practical exam prep for the popular CISA certification. Hundreds of domain-by-domain practice questions cover all of the tested Certified Information Systems Auditor exam objectives, helping you prepare for the test and for the real-world demands of a career in systems audit, security, and control. Just like the real exams, the practice questions written by veteran information security experts Peter Gregory and Mike Chapple cover the information system auditing process, the governance and management of IT, information systems acquisition, development, and implementation, information systems operations and business resilience, and the protection of information assets. These rigorous and realistic practice questions will get you ready whether this is your first role in the industry or if you are experienced and ready to advance your career. By studying the domain-by-domain questions and well as taking the full chapter practice exams, you'll get help in identifying your subject-matter strengths and weaknesses and be ready to shift from topic to topic in an exam-like setting. In the book, you'll get: Challenging questions designed to advance your understanding and comprehension of all covered exam domains Questions as similar as possible to the real CISA exam questions Complimentary access to online version of the same questions to practice your online test-taking skills Perfect for everyone studying for the CISA Certified Information Systems Auditor certification exam, this book will also benefit IT security professionals seeking to test and improve their skillset.

9 特價1904
貨到通知
下次再買

AI Powered Secure Software Engineering

2025/05/27 出版

In a world where financial systems are under constant threat, AI-Powered Secure Software Engineering offers a practical, no-fluff guide to building software that not only performs-but protects. Drawing from years of real-world experience at the intersection of fintech, AI, and cybersecurity, Gbenga Akingbulere unpacks the principles, challenges, and strategic decisions behind secure software in high-stakes environments. This is not just a technical manual-it's a roadmap for engineers, DevOps teams, and fintech leaders who are serious about trust, resilience, and intelligent defense.Gbenga Akingbulere is a software engineer specialist with deep expertise in designing AI-powered financial systems. Known for his hands-on approach and clarity of thought, Gbenga has led the development of fraud detection systems that scale, adapt, and secure critical platforms in real time. His work bridges the gap between engineering theory and operational impact, helping teams embed security as a core function-not an afterthought.

9 特價917
立即代訂
下次再買

LLM Design Patterns

Ken,Huang  著
Packt 出版
2025/05/26 出版

Explore reusable design patterns, including data-centric approaches, model development, model fine-tuning, and RAG for LLM application development and advanced prompting techniquesKey Features: - Learn comprehensive LLM development, including data prep, training pipelines, and optimization- Explore advanced prompting techniques, such as chain-of-thought, tree-of-thought, RAG, and AI agents- Implement evaluation metrics, interpretability, and bias detection for fair, reliable models- Print or Kindle purchase includes a free PDF eBookBook Description: This practical guide for AI professionals enables you to build on the power of design patterns to develop robust, scalable, and efficient large language models (LLMs). Written by a global AI expert and popular author driving standards and innovation in Generative AI, security, and strategy, this book covers the end-to-end lifecycle of LLM development and introduces reusable architectural and engineering solutions to common challenges in data handling, model training, evaluation, and deployment.You'll learn to clean, augment, and annotate large-scale datasets, architect modular training pipelines, and optimize models using hyperparameter tuning, pruning, and quantization. The chapters help you explore regularization, checkpointing, fine-tuning, and advanced prompting methods, such as reason-and-act, as well as implement reflection, multi-step reasoning, and tool use for intelligent task completion. The book also highlights Retrieval-Augmented Generation (RAG), graph-based retrieval, interpretability, fairness, and RLHF, culminating in the creation of agentic LLM systems.By the end of this book, you'll be equipped with the knowledge and tools to build next-generation LLMs that are adaptable, efficient, safe, and aligned with human values.What You Will Learn: - Implement efficient data prep techniques, including cleaning and augmentation- Design scalable training pipelines with tuning, regularization, and checkpointing- Optimize LLMs via pruning, quantization, and fine-tuning- Evaluate models with metrics, cross-validation, and interpretability- Understand fairness and detect bias in outputs- Develop RLHF strategies to build secure, agentic AI systemsWho this book is for: This book is essential for AI engineers, architects, data scientists, and software engineers responsible for developing and deploying AI systems powered by large language models. A basic understanding of machine learning concepts and experience in Python programming is a must.Table of Contents- Introduction to LLM Design Patterns- Data Cleaning for LLM Training- Data Augmentation- Handling Large Datasets for LLM Training- Data Versioning- Dataset Annotation and Labeling- Training Pipeline- Hyperparameter Tuning- Regularization- Checkpointing and Recovery- Fine-Tuning- Model Pruning- Quantization- Evaluation Metrics- Cross-Validation- Interpretability- Fairness and Bias Detection- Adversarial Robustness- Reinforcement Learning from Human Feedback- Chain-of-Thought Prompting- Tree-of-Thoughts Prompting- Reasoning and Acting- Reasoning WithOut Observation- Reflection Techniques- Automatic Multi-Step Reasoning and Tool Use- Retrieval-Augmented Generation- Graph-Based RAG- Advanced RAG- Evaluating RAG Systems- Agentic Patterns

9 特價2524
立即代訂
下次再買

Cybersecurity in IoT Networks

Scholars' Press 出版
2025/05/26 出版

Cyber security is essential in the IoT because one threat or hack could disrupt the network - or worse, give a cyber criminal complete access to the entire system. In industries such as defense or military operations, the IoT houses extremely sensitive information. If the IoT is accessed via a weak network point or vulnerable device, hackers then have the ability to retrieve intelligence or cause physical damage to the entire network. While businesses, government and health care sectors have increasingly reaped the benefits of the IoT, this shift to interconnectedness also has raised the stakes in terms of risk and the potential financial and security damage that can occur from a hack. The more devices that are added to a network, the greater number of opportunities cyber criminals are granted for "entrances" to the data. This book has four chapters, including: Chapter I, Security and the Internet of Things;Chapter II, Future Industry Internet of Things with Zero-trust Security;Chapter III, Benefits of IoT for Business;Chapter IV, Internet of Things (IoT) Security Challenges in 2025 and References.

9 特價3397
立即代訂
下次再買
頁數11/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing