Differential Privacy
A robust yet accessible introduction to the idea, history, and key applications of differential privacy--the gold standard of algorithmic privacy protection. Differential privacy (DP) is an increasingly popular, though controversial, approach to protecting personal data. DP protects confidential data by introducing carefully calibrated random numbers, called statistical noise, when the data is used. Google, Apple, and Microsoft have all integrated the technology into their software, and the US Census Bureau used DP to protect data collected in the 2020 census. In this book, Simson Garfinkel presents the underlying ideas of DP, and helps explain why DP is needed in today's information-rich environment, why it was used as the privacy protection mechanism for the 2020 census, and why it is so controversial in some communities. When DP is used to protect confidential data, like an advertising profile based on the web pages you have viewed with a web browser, the noise makes it impossible for someone to take that profile and reverse engineer, with absolute certainty, the underlying confidential data on which the profile was computed. The book also chronicles the history of DP and describes the key participants and its limitations. Along the way, it also presents a short history of the US Census and other approaches for data protection such as de-identification and k-anonymity.
An Overview of Optical Computing and its Components
Financial Data Analysis Using Python
Spies, Lies, and Cybercrime
INSTANT USA TODAY BESTSELLER!National security strategist and former FBI counterintelligence operative Eric O'Neill exposes how nefarious cybercriminals relentlessly attempt to access your data and wallet, and arms you with his proven tactics for spotting and neutralizing cyberthreats to protect yourself, your family, and your business.Cybercriminals, domestic and foreign, are launching attacks day and night using malware, phishing scams, deepfakes, artificial intelligence, and other unscrupulous schemes designed to steal your data and hold it hostage. When they win, it costs nations, businesses, and individuals trillions of dollars annually--a figure so massive that it ranks as the third largest economy in the entire world.It's possible to fight back, but it'll take more than a strong password. Drawing on his years of experience as an FBI spy hunter and national security strategist, Eric O'Neill casts light on these malicious actors' tactics for stealing personal data and exploiting victims. Armed with this knowledge, O'Neill shares his method--called PAID--that you can use to defend yourself and stop attackers in their tracks: Prepare: Pinpoint your most critical data, identify where it resides and who can access it, and build your defenses around it.Assess: Continuously reassess your security and apply counterintelligence tactics to identify scams and cyberattacks..Investigate: Stay educated and hunt the threat before the threat hunts you.Decide: Using your new aptitude, make smart, rapid decisions under pressure..Written by a top expert in the field and with the page-turning readability of a true crime thriller, Spies, Lies, and Cybercrime offers easy-to-follow steps for staving off cyberattacks, securing data, and keeping private information safe in an increasingly digital and dizzying world.
Cloud Native Data Security with Oauth
With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth is a popular way to address this issue, but this open standard doesn't provide sufficient guidelines for using API tokens to protect business data. That alone can lead to vulnerabilities and invite data breaches. By using cloud native components in Kubernetes or similar platforms, organizations can implement a scalable, future-proof security architecture for their systems that follows a zero-trust approach to protect business data. You'll access tokens, claims, and token design with an emphasis on an API-first approach. This book takes readers through an end-to-end security architecture that scales to many components in a cloud native environment, while only requiring simple security code in applications and APIs. You'll learn: Why user identity must be part of your cloud native security stack How to integrate user identity into APIs How to externalize security, secure data access, and authenticate clients using OAuth Methods for running security components in a Kubernetes cluster How to use claims to protect business data in APIs How to follow security best practices for client applications and APIs
Machine Learning and AI with Simple Python and Matlab Scripts
A practical guide to AI applications for Simple Python and Matlab scripts Machine Learning and AI with Simple Python and Matlab Scripts introduces basic concepts and principles of machine learning and artificial intelligence to help readers develop skills applicable to many popular topics in engineering and science. Step-by-step instructions for simple Python and Matlab scripts mimicking real-life applications will enter the readers into the magical world of AI, without requiring them to have advanced math and computational skills. The book is supported by instructor only lecture slides and sample exams with multiple-choice questions. Machine Learning and AI with Simple Python and Matlab Scripts includes information on: Artificial neural networks applied to real-world problems such as algorithmic trading of financial assets, Alzheimer's disease prognosis Convolution neural networks for speech recognition and optical character recognition Recurrent neural networks for chatbots and natural language translators Typical AI tasks including flight control for autonomous drones, dietary menu planning, and route planning Advanced AI tasks including particle swarm optimization and differential and grammatical evolution as well as the current state of the art in AI tools Machine Learning and AI with Simple Python and Matlab Scripts is an accessible, thorough, and practical learning resource for undergraduate and graduate students in engineering and science programs along with professionals in related industries seeking to expand their skill sets.
Intelligent Cybersecurity and Resilience for Critical Industries
Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications thoroughly explores cybersecurity principles, strategies, and technologies crucial for protecting digital assets and combating evolving cyber threats in critical industries. This book provides indispensable guidance in fortifying cyber defenses for critical infrastructures. Each chapter offers invaluable insights into proactive defense measures, from AI-driven threat management in healthcare systems to practical applications of AI for cyber risk management in critical infrastructures. Unraveling the complexities of contemporary cyber threats, this book empowers readers with the knowledge and tools needed to navigate the intricate landscape of cybersecurity effectively. Through a multidisciplinary approach spanning AI, machine learning, and advanced technologies, it addresses the urgent challenges organizations encounter in securing their digital infrastructure and safeguarding sensitive data from malicious cyber-attacks.Technical topics discussed in the book include: AI-driven strategies for advanced malware detection and prevention Hybrid deep learning techniques for precise malware classification Machine learning applications tailored to IoT security challenges Comprehensive exploration of blockchain techniques enhancing IoT security and privacy Practical integration of security analysis modules for proactive threat intelligence. Designed as an essential reference, this book caters to students, researchers, cybersecurity professionals, and individuals keen on comprehending and tackling contemporary cyber defense and risk assessment challenges. It serves as a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills in critical industries.
Optimal Spending on Cybersecurity Measures
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet privacy laws requirements. This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business-driven risk assessments to meet the intent of Privacy and Data Protection Laws. This can be used by various stakeholders who are involved in the implementation of cybersecurity measures to safeguard sensitive data. This framework facilitates an organization's risk management decision-making process to demonstrate the mechanisms in place to fund cybersecurity measures to meet Privacy Laws and demonstrates the application of the process showcasing six case studies. This book also discusses the elements used within the cybersecurity risk management process and defines a strategic approach to minimize cybersecurity risks.Features: - Aims to strengthen the reader's understanding of industry governance, risk and compliance practices.- Incorporates an innovative approach to assess business risk management.- Explores the strategic decisions made by organizations when implementing cybersecurity measures and leverages an integrated approach to include risk management elements.
Foundation Swift 3D
Foundation Swift 3D is the ultimate guide to out of the box 3D design. Combining simple but professional 3D editing techniques with a full guide to using Swift 3D in object construction, animation, enhancement, and production, Foundation Swift 3D also features a chapter on transferring your projects into Flash MX. Foundation Swift 3D really does unlock the power of 3D on your desktop. It covers all you need to know, before you need to know it, backing up every piece of theory with solid practical tutorials. With a case study running the length of the book and organized so you get practical, hands-on experience of everything that you learn, this book will bring you all that this new, and unparalleled version of Swift 3D has to offer. Developed in association with Electric Rain, the makers of Swift 3D, Foundation Swift 3D contains all the insider information, tips, tricks, and techniques that you would expect from a book written and reviewed by Swift 3D version 3's support manager, documentation writer, beta testers and developers, and moderators of support forums. Whether you're entirely new to Swift 3D version 3, have some experience of an earlier version, or have used version 3 extensively, this book is packed with essential information from the true luminaries of the Swift 3D world that will extend your knowledge to true professional level. With Foundation Swift 3D, your world is just a few chapters away!
Fundamental Web Design and Development Skills
The world of web design is at a turning point, with great emphasis on Web Standards, designing for all browsers and platforms while still looking great and communicating your message. This is the first book for the beginner that covers all the modern methods of making web sites to get you ahead of the rest when looking for that job. The authors are all respected web design professionals, who write knowledgeably and comprehensively without all the intimidating jargon or assuming a degree in programming. What this book covers: The Web and How It Works Basic HTML Design and Process Advanced Markup: HTML, XML, and XHTML Creating Graphics for the Web Traditional Page Layout Techniques Navigation CSS: Modern Layout and Style Applying JavaScript in Your Pages An Introduction to Usability Standards Compliance Getting Your Site onto the Web Techniques for Site Maintenance and Administration Server-Side Scripting Where Do I Go from Here? From the Publisher This book is for anyone new to web design who wants to start down the path of a web professional career. No knowledge of HTML or any other web language is assumed.
Learn Design with Flash MX
You are not alone. Learn Design with Flash MX employs a unique class-based approach to learning with the goal of establishing core, generic design skills. Each chapter represents a discrete lesson covering a distinct topic of design, and in each 'class' we smoothly blend theory and practice with plentiful practical examples, and a class project that runs through the book to reinforce the learning in an integrated, real-world context, using Flash MX as the illustrative vehicle. Written from the perspective of the design course's tutor, the context is that of a Design 101 course taught in a classroom environment, where the students act as mouthpieces to ask the common questions that beginner designers are sure to ask. You'll get to know the students in the book and follow the development of these characters as your own skill and expertise evolves too. Learn Design with Flash MX covers the fundamental design principles and skills that every designer needs to master in order to create attractive, aesthetically pleasing work to a professional standard. This book addresses the shortfall in solid, traditional design knowledge in significant segments of the web design community 簽 specifically, people using Flash. It assumes that the reader is a novice in design terms with no exposure to formal web design principles or training, and little or no Flash experience. If you're coming to Flash completely from scratch, this book will give you a broad and solid introduction enabling you to create aesthetically pleasing, well laid-out sites and content, which will help you learn the trade and get access to the professional web design world. This book should even appeal to those who've read one (or more) entry-level texts on Flash; in fact, it'll complement other tutorials by providing the rich general design context and background that other introductory books lack. This book will teach readers to develop and implement their creative ideas through an understanding of whatprofessional designers in all media see as the prerequisites: composition, color, contrast, light, texture, motion, typography, and many others. If you're interested in learning design skills following a structured path, or if you've been using some of the tools of the trade, like Macromedia Flash, for some time but have never had the opportunity of a solid tutorial, this introductory level book is for you. Learn Design with Flash MX will answer all the essential design questions that other books ignore - the questions you're too frightened to ask. By addressing the core design skills from a beginner's perspective, in the context of Flash MX, readers will gain a rich, solid, and structured understanding of the what, how, and why's of the fundamental principles of good design. From experienced self-taught designers who've ever thought, "I wish I knew how to design things more effectively or more coherently ", to anyone who's looked at a cool design and said, "Jeez, I wish I'd taken a design class in school!", this book will show them the money! Anyone in the web design arena who wants overall design skills, and who needs a solid learning vehicle that will help them acquire and embed those skills; anyone who's felt that their lack of knowledge about formal design processes has got in the way of liberating their creative ideas effectively; anyone who's started a creative project in a rush, doodled around, and lost their way... this book will provide the structure that they might lack. Readers will come away from this book with: A rich, solid understanding of the concepts and basic processes that will enable them to explore further with a degree of confidence that they didn't have before Insights into universally applicable design processes and techniques An understanding of how to implement these principles in Flash MX "Learn Design with Flash MX - the missing link between creativity and technology. This book comes with a CD-ROM.
Financial Cryptography and Data Security
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Cura癟ao, during March 4-8, 2024. The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: Part I: Consensus; AMMs; fees and rewards; hardware attacks; Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
AI Revealed
This book is a guide to navigating the evolving landscape of artificial intelligence. Designed for both novices and seasoned professionals it covers a broad range of topics from fundamental ideas to innovative advancements. Readers will investigate the principles of machine learning, explore the intricacies of deep learning architectures, and discover the applications of natural language processing and computer vision. With its concise explanations and useful examples, it gives readers the knowledge and abilities they need to confidently traverse the changing field of artificial intelligence. This text also looks at real-world case studies and important ethical issues, providing insightful information about the ethical ramifications and societal effects of technology. Features: Practical applications and case studies with a section on use cases across various industries, including healthcare, finance, transportation, and retail. Actionable steps for getting started with AI include how to set up an AI development environment, learning Python for AI applications, and utilizing popular AI libraries. Resources for further study including, AI online courses, AI communities and forums, and recommended books essentially, a roadmap for continuous learning.
Optimizing Prompt Engineering for Generative AI
Large Language Models for Developers
This book offers a thorough exploration of Large Language Models (LLMs), guiding developers through the evolving landscape of generative AI and equipping them with the skills to utilize LLMs in practical applications. Designed for developers with a foundational understanding of machine learning, this book covers essential topics such as prompt engineering techniques, fine-tuning methods, attention mechanisms, and quantization strategies to optimize and deploy LLMs. Beginning with an introduction to generative AI, the book explains distinctions between conversational AI and generative models like GPT-4 and BERT, laying the groundwork for prompt engineering (Chapters 2 and 3). Some of the LLMs that are used for generating completions to prompts include Llama-3.1 405B, Llama 3, GPT-4o, Claude 3, Google Gemini, and Meta AI. Readers learn the art of creating effective prompts, covering advanced methods like Chain of Thought (CoT) and Tree of Thought prompts. As the book progresses, it details fine-tuning techniques (Chapters 5 and 6), demonstrating how to customize LLMs for specific tasks through methods like LoRA and QLoRA, and includes Python code samples for hands-on learning. Readers are also introduced to the transformer architecture's attention mechanism (Chapter 8), with step-by-step guidance on implementing self-attention layers. For developers aiming to optimize LLM performance, the book concludes with quantization techniques (Chapters 9 and 10), exploring strategies like dynamic quantization and probabilistic quantization, which help reduce model size without sacrificing performance.FEATURES- Covers the full lifecycle of working with LLMs, from model selection to deployment- Includes code samples using practical Python code for implementing prompt engineering, fine-tuning, and quantization- Teaches readers to enhance model efficiency with advanced optimization techniques- Includes companion files with code and images -- available from the publisher
Large Language Models
This book begins with an overview of the Generative AI landscape, distinguishing it from conversational AI and shedding light on the roles of key players like DeepMind and OpenAI. It then reviews the intricacies of ChatGPT, GPT-4, and Gemini, examining their capabilities, strengths, and competitors. Readers will also gain insights into the BERT family of LLMs, including ALBERT, DistilBERT, and XLNet, and how these models have revolutionized natural language processing. Further, the book covers prompt engineering techniques, essential for optimizing the outputs of AI models, and addresses the challenges of working with LLMs, including the phenomenon of hallucinations and the nuances of fine-tuning these advanced models. Designed for software developers, AI researchers, and technology enthusiasts with a foundational understanding of AI, this book offers both theoretical insights and practical code examples in Python. Companion files with code, figures, and datasets are available for downloading from the publisher.
Advanced Python Scripting for ArcGIS Pro
Tackle complex spatial data tasks effortlessly with this easy-to-follow guide to writing specialized Python scripts and developing tools for spatial data in ArcGIS Pro.
The Intricacies Of Online Privacy And Data Protection
Financial Cryptography and Data Security
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Cura癟ao, during March 4-8, 2024. The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: Part I: Consensus; AMMs; fees and rewards; hardware attacks; Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.