0518_龍顏
0516~0518_龍顏

英文書 > 全部商品

Selected Areas in Cryptography - Sac 2024

Springer 出版
2025/03/14 出版

This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024. The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption. Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.

9 特價4436
立即代訂
下次再買

Information Security in a Connected World

Colin,Boyd  著
Springer 出版
2025/03/14 出版
9 特價4436
立即代訂
下次再買

Selected Areas in Cryptography - Sac 2024

Springer 出版
2025/03/14 出版

This two-volume set LNCS 15516-15517 contains revised selected papers from the 31st International Conference on Selected Areas in Cryptography, SAC 2024, held in Montreal, QC, Canada, in August 2024. The 25 full papers presented in these proceedings were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Privacy-preserving cryptography; post-quantum cryptography; attacks on public-key cryptography; and identity-based encryption. Part II: Authenticated encryption; symmetric design strategies; cryptanalysis of arithmetization-oriented primitives; symmetric primitive design; and implementations and side-channel analysis.

9 特價4436
立即代訂
下次再買

Redefining Hacking

Omar,Santos  著
Addison-Wesl 出版
2025/03/13 出版

Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Written by industry experts Omar Santos, Savannah Lazzara, and Wesley Thurner, this book blends real-world insights with forward-looking perspectives on AI, automation, and quantum computing. Packed with hands-on exercises, actionable strategies, and case studies, it empowers readers to think like attackers while proactively strengthening their defenses. Gain practical knowledge to master red teaming, bug bounty hunting, and prepare for an AI-influenced cybersecurity landscape. This practical forward-thinking book provides: Holistic Coverage: Comprehensive insights into red teaming and bug bounty hunting Future Trends: Explore AI, automation, and quantum computing's impact on security Hands-On Learning: Includes exercises, review questions, and GitHub resources Expert Guidance: Authored by seasoned cybersecurity professionals with diverse expertise

9 特價2753
立即代訂
下次再買

Hands-on Penetration Testing for Web Applications

Richa,Gupta  著
2025/03/12 出版
9 特價2193
立即代訂
下次再買

AD HOC Networks

Uras,Panahi  著
Scholars' Press 出版
2025/03/10 出版
9 特價3304
立即代訂
下次再買

Decide Better

Lieven,Raes  著
Springer 出版
2025/03/10 出版
9 特價3131
立即代訂
下次再買

An Overview of Optical Computing and its Components

2025/03/10 出版
9 特價3029
立即代訂
下次再買

Blockchain - Pioneering the Web3 Infrastructure for an Intelligent Future

Luyao,Zhang  著
Intechopen 出版
2025/03/09 出版
9 特價6345
立即代訂
下次再買

Spies, Lies, and Cybercrime

Eric,O'Neill  著
2025/03/09 出版

INSTANT USA TODAY BESTSELLER!National security strategist and former FBI counterintelligence operative Eric O'Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his proven tactics for spotting and neutralizing cyberthreats to protect yourself, your family, and your business.Cybercriminals, domestic and foreign, are launching attacks day and night using malware, phishing scams, deepfakes, artificial intelligence, and other unscrupulous schemes designed to steal your data and hold it hostage. When they win, it costs nations, businesses, and individuals trillions of dollars annually--a figure so massive that it ranks as the third largest economy in the entire world.It's possible to fight back, but it'll take more than a strong password. Drawing on his years of experience as an FBI spy hunter and national security strategist, Eric O'Neill casts light on these malicious actors' tactics for stealing personal data and exploiting victims. Armed with this knowledge, O'Neill shares his method--called PAID--that you can use to defend yourself and stop attackers in their tracks: Prepare: Pinpoint your most critical data, identify where it resides and who can access it, and build your defenses around it.Assess: Continuously reassess your security and apply counterintelligence tactics to identify scams and cyberattacks..Investigate: Stay educated and hunt the threat before the threat hunts you.Decide: Using your new aptitude, make smart, rapid decisions under pressure..Written by a top expert in the field and with the page-turning readability of a true crime thriller, Spies, Lies, and Cybercrime offers easy-to-follow steps for staving off cyberattacks, securing data, and keeping private information safe in an increasingly digital and dizzying world.

9 特價1026
立即代訂
下次再買

Financial Data Analysis Using Python

2025/03/09 出版
9 特價1881
立即代訂
下次再買

Cloud Native Data Security with Oauth

Gary,Archer  著
O'Reilly Media 出版
2025/03/07 出版

With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth is a popular way to address this issue, but this open standard doesn't provide sufficient guidelines for using API tokens to protect business data. That alone can lead to vulnerabilities and invite data breaches. By using cloud native components in Kubernetes or similar platforms, organizations can implement a scalable, future-proof security architecture for their systems that follows a zero-trust approach to protect business data. You'll access tokens, claims, and token design with an emphasis on an API-first approach. This book takes readers through an end-to-end security architecture that scales to many components in a cloud native environment, while only requiring simple security code in applications and APIs. You'll learn: Why user identity must be part of your cloud native security stack How to integrate user identity into APIs How to externalize security, secure data access, and authenticate clients using OAuth Methods for running security components in a Kubernetes cluster How to use claims to protect business data in APIs How to follow security best practices for client applications and APIs

9 特價2052
立即代訂
下次再買

Machine Learning and AI with Simple Python and Matlab Scripts

M Umit,Uyar  著
2025/03/06 出版

A practical guide to AI applications for Simple Python and Matlab scripts Machine Learning and AI with Simple Python and Matlab Scripts introduces basic concepts and principles of machine learning and artificial intelligence to help readers develop skills applicable to many popular topics in engineering and science. Step-by-step instructions for simple Python and Matlab scripts mimicking real-life applications will enter the readers into the magical world of AI, without requiring them to have advanced math and computational skills. The book is supported by instructor only lecture slides and sample exams with multiple-choice questions. Machine Learning and AI with Simple Python and Matlab Scripts includes information on: Artificial neural networks applied to real-world problems such as algorithmic trading of financial assets, Alzheimer's disease prognosis Convolution neural networks for speech recognition and optical character recognition Recurrent neural networks for chatbots and natural language translators Typical AI tasks including flight control for autonomous drones, dietary menu planning, and route planning Advanced AI tasks including particle swarm optimization and differential and grammatical evolution as well as the current state of the art in AI tools Machine Learning and AI with Simple Python and Matlab Scripts is an accessible, thorough, and practical learning resource for undergraduate and graduate students in engineering and science programs along with professionals in related industries seeking to expand their skill sets.

9 特價4544
立即代訂
下次再買

Smart Multimedia

Springer 出版
2025/03/06 出版

This book constitutes the refereed post-proceedings of the 4th International Conference on Smart Multimedia, ICSM 2024, held in Los Angeles, California, USA, in March 28-30, 2024. The 9 full papers, 8 special papers, 4 industrial papers, 3 late breaking papers, and 3 short papers presented were carefully reviewed and selected from 60 submissions. The papers are organized in the following topical sections: machine learning for multimedia; multimedia; special session on smart homes and cities - the future through smart technological innovations; multimedia processing; short and industrial papers; industrial trend; late breaking papers; special session: haptic and human machine interaction.

9 特價4436
立即代訂
下次再買

Critical Information Infrastructures Security

Springer 出版
2025/03/06 出版
9 特價4175
立即代訂
下次再買

Learning ParrotOS

Arvin,Destar  著
Gitforgits 出版
2025/03/06 出版

As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations. It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks.You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.Key LearningsInstall, configure and customize ParrrotOS for ethical hacking and pentesting tasks.Use bash scripting to automate and streamline penetration testing workflows.Manage files and directories using command-line tools like rsync, grep, and awk.Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.Perform robust password audits and recover weak credentials using John the Ripper.Test wireless networks using Aircrack-ng in WEP and WPA protocols.Leverage pivoting techniques across compromised networks.Integrate automated recon and scanning for continuous network monitoring.Table of ContentGetting Started with Parrot OSUp and Running with Parrot OSSystem Configuration and CustomizationMastering Command-Line UtilitiesLeveraging Parrot OS Security ToolsConducting Network ReconnaissanceExploiting Vulnerabilities with MetasploitAdvanced Web Application TestingImplementing Sniffing and Tunneling

9 特價2565
立即代訂
下次再買

Azure Networking

Jose,Moreno  著
2025/03/04 出版
9 特價2193
立即代訂
下次再買

Ransom War

Max,Smeets  著
2025/03/04 出版
9 特價1417
立即代訂
下次再買

Wireless Sensor Networks

Limin,Sun  著
Springer 出版
2025/03/03 出版

This two-volume set, CCIS 2341 and CCIS 2342, constitutes the refereed proceedings of the 18th China Conference on Wireless Sensor Networks, CWSN 2024, held in Taiyuan, China, during September 20-22, 2024. The 41 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: - Part I: Cloud computing and edge computing; Internet of things security and privacy protection; Internet of things service and application technology. Part II: Smart internet of things; Theory and technology of wireless sensor network.

9 特價4436
立即代訂
下次再買

Wireless Sensor Networks

Limin,Sun  著
Springer 出版
2025/03/03 出版

This two-volume set, CCIS 2341 and CCIS 2342, constitutes the refereed proceedings of the 18th China Conference on Wireless Sensor Networks, CWSN 2024, held in Taiyuan, China, during September 20-22, 2024. The 41 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: - Part I: Cloud computing and edge computing; Internet of things security and privacy protection; Internet of things service and application technology. Part II: Smart internet of things; Theory and technology of wireless sensor network.

9 特價4175
立即代訂
下次再買

Frauds, Phones & Fingerprints

Almis,Ledas  著
FriesenPress 出版
2025/02/28 出版
9 特價1128
立即代訂
下次再買

Frauds, Phones & Fingerprints

Almis,Ledas  著
FriesenPress 出版
2025/02/28 出版
9 特價649
立即代訂
下次再買

Natural Language Processing Cookbook

2025/02/26 出版
9 特價2193
立即代訂
下次再買

Intelligent Cybersecurity and Resilience for Critical Industries

Mounia,Zaydi  著
2025/02/26 出版

Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications thoroughly explores cybersecurity principles, strategies, and technologies crucial for protecting digital assets and combating evolving cyber threats in critical industries. This book provides indispensable guidance in fortifying cyber defenses for critical infrastructures. Each chapter offers invaluable insights into proactive defense measures, from AI-driven threat management in healthcare systems to practical applications of AI for cyber risk management in critical infrastructures. Unraveling the complexities of contemporary cyber threats, this book empowers readers with the knowledge and tools needed to navigate the intricate landscape of cybersecurity effectively. Through a multidisciplinary approach spanning AI, machine learning, and advanced technologies, it addresses the urgent challenges organizations encounter in securing their digital infrastructure and safeguarding sensitive data from malicious cyber-attacks.Technical topics discussed in the book include: AI-driven strategies for advanced malware detection and prevention Hybrid deep learning techniques for precise malware classification Machine learning applications tailored to IoT security challenges Comprehensive exploration of blockchain techniques enhancing IoT security and privacy Practical integration of security analysis modules for proactive threat intelligence. Designed as an essential reference, this book caters to students, researchers, cybersecurity professionals, and individuals keen on comprehending and tackling contemporary cyber defense and risk assessment challenges. It serves as a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills in critical industries.

9 特價7308
立即代訂
下次再買

Secure by Design

Rethink Press 出版
2025/02/25 出版
9 特價1008
立即代訂
下次再買

Azure OpenAI Essentials

Packt 出版
2025/02/25 出版
9 特價2294
立即代訂
下次再買

Optimal Spending on Cybersecurity Measures

Tara,Kissoon  著
CRC Press 出版
2025/02/25 出版

This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of Privacy and Data Protection Laws.

9 特價3600
立即代訂
下次再買

Financial Cryptography and Data Security

Jeremy,Clark  著
Springer 出版
2025/02/24 出版

The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Cura癟ao, during March 4-8, 2024. The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: Part I: Consensus; AMMs; fees and rewards; hardware attacks; Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.

9 特價4436
立即代訂
下次再買

Large Language Models for Developers

Ingram 出版
2025/02/23 出版

This book offers a thorough exploration of Large Language Models (LLMs), guiding developers through the evolving landscape of generative AI and equipping them with the skills to utilize LLMs in practical applications. Designed for developers with a foundational understanding of machine learning, this book covers essential topics such as prompt engineering techniques, fine-tuning methods, attention mechanisms, and quantization strategies to optimize and deploy LLMs. Beginning with an introduction to generative AI, the book explains distinctions between conversational AI and generative models like GPT-4 and BERT, laying the groundwork for prompt engineering (Chapters 2 and 3). Some of the LLMs that are used for generating completions to prompts include Llama-3.1 405B, Llama 3, GPT-4o, Claude 3, Google Gemini, and Meta AI. Readers learn the art of creating effective prompts, covering advanced methods like Chain of Thought (CoT) and Tree of Thought prompts. As the book progresses, it details fine-tuning techniques (Chapters 5 and 6), demonstrating how to customize LLMs for specific tasks through methods like LoRA and QLoRA, and includes Python code samples for hands-on learning. Readers are also introduced to the transformer architecture's attention mechanism (Chapter 8), with step-by-step guidance on implementing self-attention layers. For developers aiming to optimize LLM performance, the book concludes with quantization techniques (Chapters 9 and 10), exploring strategies like dynamic quantization and probabilistic quantization, which help reduce model size without sacrificing performance.FEATURES- Covers the full lifecycle of working with LLMs, from model selection to deployment- Includes code samples using practical Python code for implementing prompt engineering, fine-tuning, and quantization- Teaches readers to enhance model efficiency with advanced optimization techniques- Includes companion files with code and images -- available from the publisher

9 特價2223
立即代訂
下次再買

AI Revealed

Herman,Erik  著
Ingram 出版
2025/02/23 出版

This book is a guide to navigating the evolving landscape of artificial intelligence. Designed for both novices and seasoned professionals it covers a broad range of topics from fundamental ideas to innovative advancements. Readers will investigate the principles of machine learning, explore the intricacies of deep learning architectures, and discover the applications of natural language processing and computer vision. With its concise explanations and useful examples, it gives readers the knowledge and abilities they need to confidently traverse the changing field of artificial intelligence. This text also looks at real-world case studies and important ethical issues, providing insightful information about the ethical ramifications and societal effects of technology. Features: Practical applications and case studies with a section on use cases across various industries, including healthcare, finance, transportation, and retail. Actionable steps for getting started with AI include how to set up an AI development environment, learning Python for AI applications, and utilizing popular AI libraries. Resources for further study including, AI online courses, AI communities and forums, and recommended books essentially, a roadmap for continuous learning.

9 特價1436
立即代訂
下次再買

Optimizing Prompt Engineering for Generative AI

Erik,Herman  著
2025/02/23 出版
9 特價1368
立即代訂
下次再買

Digital Minimalism

Saage Books 出版
2025/02/22 出版
9 特價932
立即代訂
下次再買

Large Language Models

2025/02/21 出版

This book begins with an overview of the Generative AI landscape, distinguishing it from conversational AI and shedding light on the roles of key players like DeepMind and OpenAI. It then reviews the intricacies of ChatGPT, GPT-4, and Gemini, examining their capabilities, strengths, and competitors. Readers will also gain insights into the BERT family of LLMs, including ALBERT, DistilBERT, and XLNet, and how these models have revolutionized natural language processing. Further, the book covers prompt engineering techniques, essential for optimizing the outputs of AI models, and addresses the challenges of working with LLMs, including the phenomenon of hallucinations and the nuances of fine-tuning these advanced models. Designed for software developers, AI researchers, and technology enthusiasts with a foundational understanding of AI, this book offers both theoretical insights and practical code examples in Python. Companion files with code, figures, and datasets are available for downloading from the publisher.

9 特價1881
立即代訂
下次再買

The Art of Security

Arpin Horizon 出版
2025/02/21 出版
9 特價1692
立即代訂
下次再買

Number-Theoretic Methods in Cryptology

Springer 出版
2025/02/20 出版

This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24-26, 2024.The 9 full papers and 2 invited papers presented in this book were carefully reviewed and selected from 12 submissions. They were organized in topical sections as follows: invited talks; elliptic curves in cryptography; number theory; algebraic structures and public-key cryptography.

9 特價3914
立即代訂
下次再買

Advanced Python Scripting for ArcGIS Pro

Esri Press  著
Esri Press 出版
2025/02/19 出版

Tackle complex spatial data tasks effortlessly with this easy-to-follow guide to writing specialized Python scripts and developing tools for spatial data in ArcGIS Pro.

9 特價6075
立即代訂
下次再買

The Comprehensive Guide to Cybersecurity's Most Infamous Hacks

2025/02/18 出版
9 特價2248
貨到通知
下次再買

The Intricacies Of Online Privacy And Data Protection

2025/02/18 出版
9 特價507
立即代訂
下次再買

Angular Generative AI

2025/02/17 出版
9 特價1481
立即代訂
下次再買

Drupal 8 Explained

Independentl 出版
2025/02/17 出版
9 特價1098
立即代訂
下次再買

Practical Post-Quantum Signatures

Kwangjo,Kim  著
Springer 出版
2025/02/17 出版
9 特價3131
立即代訂
下次再買

Financial Cryptography and Data Security

Jeremy,Clark  著
Springer 出版
2025/02/17 出版

The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Cura癟ao, during March 4-8, 2024. The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: Part I: Consensus; AMMs; fees and rewards; hardware attacks; Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.

9 特價4436
立即代訂
下次再買

Firebase Storage for Angular

2025/02/17 出版
9 特價1481
立即代訂
下次再買

NgRx SignalStore

2025/02/16 出版
9 特價932
立即代訂
下次再買

Angular for Kids

2025/02/16 出版
9 特價1481
立即代訂
下次再買

NgRx SignalStore

2025/02/16 出版
9 特價1481
立即代訂
下次再買

Shippo Integration in Angular

2025/02/15 出版
9 特價1481
立即代訂
下次再買
頁數16/90
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing