0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

Securing the Digital World

CRC Press 出版
2024/12/23 出版

Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in today's digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more imperative.

9 特價8613
立即代訂
下次再買

Distributed Artificial Intelligence for 5g/6g Communications

Ingram 出版
2024/12/23 出版

The aim of this book is to delineate the challenges faced by new generation mobile networks, such as 5G and forthcoming 6G, and introduce the concept of addressing these challenges through the development of a novel Distributed AI (DAI) framework. The book proposes a distributed AI approach to handle these complexities effectively.

9 特價7308
立即代訂
下次再買

Smart Applications and Data Analysis

Springer 出版
2024/12/23 出版

This two-volume set CCIS 2167-2168 constitutes the proceedings of the 5th International Conference on Smart Applications and Data Analysis, SADASC 2024, held in Tangier, Morocco, in April 2024. The 30 full papers presented together with 10 short papers were carefully reviewed and selected from 91 submissions. They cover the following topics: designing and modeling; data management; tinyML and anomaly detection; network technologies and IOT; control, dynamic systems and optimisation; and exploitation and exploration.

9 特價4175
立即代訂
下次再買

Smart Applications and Data Analysis

Springer 出版
2024/12/23 出版

This two-volume set CCIS 2167-2168 constitutes the proceedings of the 5th International Conference on Smart Applications and Data Analysis, SADASC 2024, held in Tangier, Morocco, in April 2024. The 30 full papers presented together with 10 short papers were carefully reviewed and selected from 91 submissions. They cover the following topics: designing and modeling; data management; tinyML and anomaly detection; network technologies and IOT; control, dynamic systems and optimisation; and exploitation and exploration.

9 特價4175
立即代訂
下次再買

Applied Deep Learning on Graphs

Packt 出版
2024/12/23 出版

Gain a deep understanding of applied deep learning on graphs from data, algorithm, and engineering viewpoints to construct enterprise-ready solutions using deep learning on graph data for wide range of domainsKey Features: - Explore graph data in real-world systems and leverage graph learning for impactful business results- Dive into popular and specialized deep neural architectures like graph convolutional and attention networks- Learn how to build scalable and productionizable graph learning solutions- Purchase of the print or Kindle book includes a free PDF eBookBook Description: With their combined expertise spanning cutting-edge AI product development at industry giants such as Walmart, Adobe, Samsung, and Arista Networks, Lakshya and Subhajoy provide real-world insights into the transformative world of graph neural networks (GNNs).This book demystifies GNNs, guiding you from foundational concepts to advanced techniques and real-world applications. You'll see how graph data structures power today's interconnected world, why specialized deep learning approaches are essential, and how to address challenges with existing methods. You'll start by dissecting early graph representation techniques such as DeepWalk and node2vec. From there, the book takes you through popular GNN architectures, covering graph convolutional and attention networks, autoencoder models, LLMs, and technologies such as retrieval augmented generation on graph data. With a strong theoretical grounding, you'll seamlessly navigate practical implementations, mastering the critical topics of scalability, interpretability, and application domains such as NLP, recommendations, and computer vision.By the end of this book, you'll have mastered the underlying ideas and practical coding skills needed to innovate beyond current methods and gained strategic insights into the future of GNN technologies.What You Will Learn: - Discover how to extract business value through a graph-centric approach- Develop a basic understanding of learning graph attributes using machine learning- Identify the limitations of traditional deep learning with graph data and explore specialized graph-based architectures- Understand industry applications of graph deep learning, including recommender systems and NLP- Identify and overcome challenges in production such as scalability and interpretability- Perform node classification and link prediction using PyTorch GeometricWho this book is for: For data scientists, machine learning practitioners, researchers delving into graph-based data, and software engineers crafting graph-related applications, this book offers theoretical and practical guidance with real-world examples. A foundational grasp of ML concepts and Python is presumed.Table of Contents- Introduction to Graph Learning- Graph Learning in the Real World- Graph Representation Learning- Deep Learning Models for Graphs- Graph Deep Learning Challenges- Harnessing Large Language Models for Graph Learning- Graph Deep Learning in Practice- Graph Deep Learning for Natural Language Processing- Building Recommendation Systems Using Graph Deep Learning- Graph Deep Learning for Computer Vision- Emerging Applications- The Future of Graph Learning

9 特價2294
立即代訂
下次再買

Optical Networks for Telecommunications Students

2024/12/21 出版

This book introduces undergraduate telecommunications students to the fundamentals of optical networks, combining theory and hands-on practice. It explores the evolution of optical telecommunications, highlighting the advantages of fiber optics, such as high bandwidth, low attenuation, and immunity to interference.The book covers essential topics, including light properties, fiber types, and challenges like attenuation and dispersion. Key components like LEDs, lasers, photodiodes, and amplifiers (EDFAs) are discussed alongside technologies like Wavelength Division Multiplexing (WDM). Modulation techniques (ASK, PSK) and detection methods (direct, coherent) are explained in detail.Network architectures such as FTTH and PON, high-speed systems (10G to 100G), and long-distance networks are thoroughly examined. Practical projects and simulations using OptiSystem provide students with real-world experience.Emerging trends like integrated photonics, 5G, Li-Fi, and quantum communications are also explored. This comprehensive guide equips students with the knowledge to navigate and contribute to the rapidly evolving field of optical telecommunications.

9 特價2111
立即代訂
下次再買

Mastering the Red Hat Certified Engineer (RHCE) Exam

Luca,Berton  著
Ingram 出版
2024/12/20 出版

DESCRIPTION "Mastering the Red Hat Certified Engineer (RHCE) Exam" is a comprehensive guide designed for IT professionals and system administrators aspiring to achieve RHCE certification. This book is an essential resource for mastering Red Hat Enterprise Linux (RHEL) skills and advancing careers in Linux administration.This book is designed to guide you through every stage of preparing for the RHCE certification. It introduces the importance of RHCE in IT and breaks down the exam blueprint, covering both theory and practical skills. You will learn Linux basics, automate tasks using tools like bash scripting and Ansible, manage network services and SELinux security, and explore emerging technologies like containers and virtualization. The book also covers performance optimization and troubleshooting, providing strategies to tackle the exam with confidence. Practice exams simulate real-world scenarios to help you succeed and achieve your RHCE certification.By the end, readers will be fully prepared for the RHCE exam and equipped with practical skills for Linux administration roles. This book enables aspiring engineers to excel in complex Linux environments, supporting their journey towards RHCE certification and professional growth in the dynamic IT landscape.WHAT YOU WILL LEARN● The essentials of Red Hat Enterprise Linux administration.● Automation of tasks using Ansible and scripting tools.● Effective management of networking and security in RHEL.● Hands-on skills in SELinux configuration and troubleshooting.● Practical insights into container management and deployment.● Preparation techniques for success in the RHCE certification.WHO THIS BOOK IS FORThis book is intended for IT professionals and system administrators with basic to intermediate Linux knowledge. It is also suitable for those aiming for RHCE certification and educators seeking a structured resource for teaching RHEL system management and automation.

9 特價2083
立即代訂
下次再買

Intelligent Spectrum Management

Sridhar,Iyer  著
Ingram 出版
2024/12/20 出版

Forward-thinking reference on spectrum sharing and resource management for 5G, B5G, and 6G wireless networks Blockchain and AI-Enabled Intelligent Spectrum Sharing and Infrastructure Management explores various aspects of spectrum sharing and resource management in 5G, beyond 5G, and the envisaged 6G networks. The book offers an in-depth exploration of intelligent and secure sharing of spectrum and resource management in existing and future mobile networks. The book sets the stage by providing an insight to the evolution of mobile networks and highlights the importance of spectrum sharing and resource management in next-generation wireless networks. At the core, the book explores various promising technologies such as cognitive radio, reinforcement learning, deep learning, reconfigurable intelligent surfaces, and blockchain technology towards efficient, intelligent, and secure sharing of spectrum and resource management. Moreover, the book presents dynamic and decentralized resource management techniques, including, network slicing, game theory, and blockchain-enabled approaches. Topics covered include: Spectrum, a limited and scarce resource, and why it must be utilized optimally and transparently Future applications envisioned with 6G, such as digital twins, Industry 5.0, holographic telepresence, and Extended Reality (XR) Challenges when Dynamic Spectrum Management (DSM) is enabled through Machine Learning (ML) techniques, including the complexity of received signals and the difficulty in obtaining accurate network data such as channel state information Reinforcement learning and deep learning assisted spectrum management Synergy between Artificial Intelligence (AI) and blockchain technology for spectrum management Private networks, including their prospects, architecture, enabling concepts, and techniques for efficient operation In essence, various innovative technologies and approaches that can be leveraged to enhance spectrum utilization and efficiently manage network resources are discussed in Blockchain and AI-Enabled Intelligent Spectrum Sharing and Infrastructure Management. The book is a potential reference for researchers, academics, and professionals in the wireless service provider industry, as well as regulators and officials.

9 特價6655
立即代訂
下次再買

Language Intelligence

Akshi,Kumar  著
Ingram 出版
2024/12/20 出版

Thorough review of foundational concepts and advanced techniques in natural language processing (NLP) and its impact across sectors Supported by examples and case studies throughout, Language Intelligence provides an in-depth exploration of the latest advancements in natural language processing (NLP), offering a unique blend of insight on theoretical foundations, practical applications, and future directions in the field. Composed of 10 chapters, this book provides a thorough understanding of both foundational concepts and advanced techniques, starting with an overview of the historical development of NLP and essential mechanisms of Natural Language Understanding (NLU) and Natural Language Generation (NLG). It delves into the data landscape crucial for NLP, emphasizing ethical considerations, and equips readers with fundamental text processing techniques. The book also discusses linguistic features central to NLP and explores computational and cognitive approaches that enrich the field's advancement. Practical applications and advanced processing techniques across various sectors like healthcare, legal, finance, and education are showcased, along with a critical examination of NLP metrics and methods for evaluation. The appendices offer detailed explorations of text representation methods, advanced applications, and Python's NLP capabilities, aiming to inform, inspire, and ignite a passion for NLP in the ever-expanding digital universe. Written by a highly qualified academic with significant research experience in the field, Language Intelligence covers sample topics including: Fundamental text processing, covering text cleaning, sentence splitting, tokenization, lemmatization and stemming, stop-word removal, part-of-speech tagging, and parsing and syntactic analysis Computational and cognitive approaches, covering human-like reasoning, transfer learning, and learning with minimal examples Affective, psychological, and content analysis, covering sentiment analysis, emotion recognition, irony, humour, and sarcasm detection, and indicators of distress Multilingual natural language processing, covering translation and transliteration, cross-lingual models and embeddings, low-resource language processing, and cultural nuance and idiom recognition Language Intelligence is an ideal reference on the subject for professionals across sectors and graduate students in related programs of study who have a foundational understanding of computer science, linguistics, and artificial intelligence and are looking to delve deeper into the intricacies of NLP.

9 特價6426
立即代訂
下次再買

Wireless Security through Physical Layer Innovations

You,Wu  著
Ingram 出版
2024/12/19 出版

The advent of wireless communication has revolutionized the way we connect and share information. However, with this convenience comes the challenge of ensuring the security of data transmitted over the airwaves. This book delves into the critical domain of Physical Layer Security (PLS), focusing on key generation and authentication technologies that leverage the unique characteristics of wireless channels to safeguard communication against eavesdropping and other malicious attacks.Part I of the book is dedicated to the exploration of key generation technology based on channel characteristics. Part II shifts the focus to physical layer security technology based on channel characterization.

9 特價4773
立即代訂
下次再買

Cyber Security, Cryptology, and Machine Learning

Shlomi,Dolev  著
Springer 出版
2024/12/18 出版

This book constitutes the proceedings of the 8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024, held in Be'er Sheva, Israel, during December 19-20, 2024. The 16 full papers and 11 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on the current innovative research developments in the field of cyber security, cryptography, and machine learning systems and networks.

9 特價3914
立即代訂
下次再買

A Volterra Approach to Digital Predistortion

Ingram 出版
2024/12/18 出版

Thorough discussion of the theory and application of the Volterra series for impairments compensation in RF circuits and systems A Volterra Approach to Digital Predistortion: Sparse Identification and Estimation offers a comprehensive treatment of the Volterra series approach as a practical tool for the behavioral modeling and linearization of nonlinear wireless communication systems. Although several perspectives can be considered when analyzing nonlinear effects, this book focuses on the Volterra series to study systems with real-valued continuous time RF signals as well as complex-valued discrete-time baseband signals in the digital signal processing field. A unified framework provides the reader with in-depth understanding of the available Volterra-based behavioral models; in particular, the book emphasizes those models derived by exploiting the knowledge of the physical phenomena that produce different types of nonlinear distortion. From these distinctive standpoints, this work remarkably contributes to theoretical issues of behavioral modeling. The book contributes to practical state-of-the-art questions on linearization, granting the reader practical guidance in designing digital predistortion schemes and adopting up-to-date machine learning methods to exploit the sparsity of the identification problem and reducing computational complexity. Later chapters include information on: Identification of Volterra-based models as a linear regression problem, allowing the adoption of sparse machine learning methods to reduce computational complexity while keeping rich model structures Deduction of Volterra models based on circuit model knowledge, offering pruned model structures that are better fitted for specific scenarios Wireless communication systems and the nonlinear effects produced by power amplifiers, mixers, frequency converters or IQ modulators Digital predistortion schemes and experimental results for both indirect and direct learning architectures A Volterra Approach to Digital Predistortion: Sparse Identification and Estimation is an essential reference on the subject for engineers and technicians who develop new products for the linearization of wireless transmitters, as well as researchers and students in fields and programs of study related to wireless communications.

9 特價5737
立即代訂
下次再買

Routing protocol and Security in MANETS

Ingram 出版
2024/12/18 出版

As the wireless network technology exploded, it has opened a new view to users and expanded the information and application sharing very conveniently and fast. Mobile ad hoc networks (MANETs) use wireless technology without a pre-existing infrastructure (access points). As the name states, MANETs consists of mobile nodes, which can vary from notebooks, PDAs to any electronic device that has the wireless RF transceiver and message handling capability. Mobility and no-infrastructure forms the basis of this network type.Mobility gives maximum freedom to users, as they can be connected to then et work, whether they are fixed or moving, unless they are in the range of then et work. Also, it is highly dynamic, as the new nodes come, they can be connected to the network very easily.Unlike the fixed networks or traditional wireless networks, MANETs don't need any infrastructure to create and maintain communication between nodes. This property provides the ability to create a network in very unexpected and urgent situations very quickly, also without any extra cost.

9 特價2937
立即代訂
下次再買

AI-Based Metaheuristics for Information Security and Digital Media

Ingram 出版
2024/12/17 出版

This book examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications.

9 特價3339
立即代訂
下次再買

Heterogenous Computational Intelligence in Internet of Things

Pawan,Singh  著
Ingram 出版
2024/12/17 出版

Despite DRL, there are still domain-specific challenges in complex wireless network virtualization requiring further study covered in this book; DNN architectures design with 5G network optimization, developing intelligent mechanism for automated management of virtual communications in SDNs, etc

9 特價3339
立即代訂
下次再買

Internet of Things in Modern Computing

Ingram 出版
2024/12/17 出版

The text focuses on the theory, design, and implementation of the Internet of Things in a modern communication system. It will be useful to senior undergraduate, graduate students, and researchers in diverse fields domains including electrical engineering, electronics and communications engineering.

9 特價3444
立即代訂
下次再買

Agile Security in the Digital Era

Mounia,Zaydi  著
Ingram 出版
2024/12/17 出版

In an era defined by rapid digital transformation, "Agile Security in the Digital Era: Challenges and Cybersecurity Trends" emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.

9 特價8352
立即代訂
下次再買

Information Systems Security

Springer 出版
2024/12/17 出版

This book constitutes the refereed proceedings of the 20th International Conference on Information Systems Security, ICISS 2024, held in Jaipur, India, during December 16-20, 2024. The 18 full papers and 6 short papers included in this book were carefully reviewed and selected from 93 submissions. They were organized in topical sections as follows: System Security; Network Security; Attack; Malware and Vulnerability Detection; Privacy & Usability; AI Security; and Industry Demo/Practice.

9 特價4175
立即代訂
下次再買

Langchain for Life Science and Healthcare

Ingram 出版
2024/12/16 出版

Feeling overwhelmed by the volume of data in your research? Sifting through massive amounts of data to find useful insights is becoming increasingly difficult in drug discovery, genetics, and healthcare. Enter the era of generative AI with LangChain, whose groundbreaking tools are changing the way life scientists and researchers operate. In this groundbreaking book, Dr. Ivan Reznikov teaches you to harness the power of AI to elevate your research capabilities. Divided into two parts, the first is essential for any specialist, covering the transition from traditional statistics to generative AI, the fundamentals of large language models, and the practical uses of LangChain. The second part is designed for life science professionals who want to create AI applications for biology, chemistry, drug development, and more. By the end, you will: Learn how to easily create and integrate LangChain applications into research Discover how to substantially accelerate your experimental and data analysis operations Explore cutting-edge AI solutions designed to address complex research problems Gain the skills and knowledge to advance your career in AI-enhanced life sciences

9 特價2736
立即代訂
下次再買

Web Automation Testing Using Playwright

Ingram 出版
2024/12/16 出版

DESCRIPTION The purpose of the book Web Automation Testing Using Playwright is to teach you how to use Playwright to automate your web testing. Playwright, a powerful automation tool developed by Microsoft, is a modern web automation framework that is fast, reliable, and easy to use.This book begins by introducing automation testing, its benefits, and Playwright, covering setup, scripting, and Playwright's architecture. It guides you through creating frameworks, selector strategies, and handling complex web elements like shadow DOM and iframes. Explore Playwright features such as Codegen, Inspector, UI mode, debugging with Trace Viewer, and generating detailed reports. Learn advanced techniques like building frameworks using Page Object Model (POM), integrating Cucumber/BDD, API testing, HTTP request interception, and accessibility and visual testing. Additionally, the book explores test execution in CI/CD tools, parallel testing, AI-driven test automation, leveraging generative AI like ChatGPT, and future trends in test automation.By the end of this book, you will be a web automation expert, writing efficient tests that validate web app functionality. Automate complex scenarios, handle edge cases, and leverage AI for intelligent testing. WHAT YOU WILL LEARN● Writing testing scripts for end-to-end, functional, API, accessibility, and visual tests with Playwright.● Mastering UI elements like alerts, tabs, drag-and-drop, iframes, and shadow DOM handling.● Debugging effectively using Playwright features like Codegen, Inspector, UI mode, and Trace Viewer.● Implementing Cucumber/BDD, Page Object Model (POM), and CI/CD pipeline integration with Playwright.● Leveraging AI tools for test automation, including script creation, debugging, and understanding generative AI like ChatGPT.WHO THIS BOOK IS FORThe target audience for this book is test automation engineers, web developers, product owners, and anyone who wants to learn about tool Playwright and test their application from scratch to the end of the applications.

9 特價2083
立即代訂
下次再買

Collection 8 Digitization

Ingram 出版
2024/12/15 出版

The term "digitalization" evokes a wide range of reactions. On the one hand, there are visions of a better and fairer world in the future; on the other, there are fears of change and even fear of electronic machines. An attempt at a simple definition should help. Digitization is the conversion and presentation of information into files with the help of electronic information technology such as computers, cell phones, Internet applications and a wide variety of file databases. More or less unnoticed, digitized technology has become an everyday companion and part of modern society in recent decades. Further development is taken for granted; a modern society needs technological progress as a matter of course. The study is divided into four parts: general digitalization, digital learning and teaching, artificial intelligence and networking.

9 特價2111
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/14 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/14 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價4175
立即代訂
下次再買

Progress in Cryptology - Indocrypt 2024

Springer 出版
2024/12/14 出版

This 2-volume set LNCS 15495-15496 constitutes the refereed proceedings of the 25th International Conference on Cryptology in India, held in Chennai, India, during December 18-21, 2024. The 31 full papers presented in these proceedings were carefully reviewed and selected from 96 submissions. They are organized into these topical sections: Part I: Foundations; symmetric-key cryptography; cryptographic constructions; and quantum cryptography. Part II: Cryptanalysis; post-quantum cryptography; and blockchain and cloud computing.

9 特價3914
立即代訂
下次再買

Progress in Cryptology - Indocrypt 2024

Springer 出版
2024/12/14 出版

This 2-volume set LNCS 15495-15496 constitutes the refereed proceedings of the 25th International Conference on Cryptology in India, held in Chennai, India, during December 18-21, 2024. The 31 full papers presented in these proceedings were carefully reviewed and selected from 96 submissions. They are organized into these topical sections: Part I: Foundations; symmetric-key cryptography; cryptographic constructions; and quantum cryptography. Part II: Cryptanalysis; post-quantum cryptography; and blockchain and cloud computing.

9 特價3914
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/14 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價4175
立即代訂
下次再買

Practical C++ Machine Learning

Ingram 出版
2024/12/13 出版

Practical C++ Machine Learning introduces C++ programmers to the world of machine learning. If you know C++ but haven't worked with machine learning solutions before, this book is a good place to start learning the basics and experimenting with the language's essential concepts and techniques.The book starts off by showing you how to set up a development environment and put together some basic neural networks using the Flashlight library. It then covers essential tasks like data preprocessing, model training, and evaluation, with practical examples that show how machine learning works in a C++ context. You will also learn strategies for dealing with common problems like overfitting and performance optimization. The next few chapters get into more complex topics like convolutional neural networks, model deployment, and some key performance tuning techniques. This will help you develop and integrate your own models into applications.By the end of the book, you will have essential hands-on experience and a better clarity to explore and expand your machine learning knowledge in C++. This book doesn't aim to cover everything, but it does serve as a good starting point for you to confidently dive into the world of machine learning and deep learning.Key LearningsUse Flashlight to set up a C++ environment for machine learning projects.Implement neural networks from scratch to gain a hands-on understanding.Preprocess and augment data effectively to improve model performance.Train and evaluate models using appropriate loss functions and metrics.Explore overfitting challenges with techniques like regularization and dropout.Build advanced architectures like ResNet.Apply transfer learning to leverage pre-trained models.Deploy models and integrate them into real-world C++ apps.Implement real-time inference with optimized performance.Improve performance using GPU acceleration and multi-threading techniques.Table of ContentGetting Started with C++ Machine LearningData Handling and PreprocessingBuilding a Simple Neural NetworkTraining Deep Neural NetworksConvolutional Neural NetworksImproving Model PerformanceAdvanced Neural Network ArchitecturesDeployment and IntegrationParallelism and Performance Scaling

9 特價2394
立即代訂
下次再買

Podcast Studies

2024/12/12 出版

Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in academia, revealing its significant impact on scholarly communication and approaches to research and knowledge creation. This collection presents in-depth analyses from scholars who have integrated podcasting into their academic pursuits. The book systematically explores the medium's implications for teaching, its effectiveness in reaching broader audiences, and its role in reshaping the dissemination of academic work. Covering a spectrum of disciplines, the contributors detail their engagement with podcasting, providing insight into its use as both a research tool and an object of analysis, thereby illuminating the multifaceted ways in which podcasting intersects with and influences academic life. The volume provides substantive evidence of podcasting's transformative effect on academia, offering reflections on its potential to facilitate a more accessible and engaging form of scholarly output. By presenting case studies and empirical research, Podcast Studies: Practice into Theory underscores the originality of podcasting as an academic endeavor and its utility in expanding the reach and impact of scholarly work. It serves as a key resource for academics, researchers, and practitioners interested in the application and study of podcasting as a novel vector for knowledge creation and distribution.

9 特價3847
貨到通知
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/12 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價4175
立即代訂
下次再買

2025 Social Media Content Planner & Guide

Ingram 出版
2024/12/12 出版

Ready to Master Social Media in 2025 with Real Strategies for Real Success?Award-winning social media strategist and four-time best-selling author Louise McDonnell presents her essential guide for entrepreneurs, small businesses, and digital marketers eager to elevate their social media impact. With this comprehensive Social Media Content, you'll learn to plan, prioritize, and create high-quality content that saves time and boosts profits, making it a vital resource for any business owner.Drawing from over a decade of experience, Louise McDonnell shares practical insights and strategies that have helped countless business owners connect with their audience and achieve tangible results. With month-by-month inspiration, powerful content ideas, and an online content planning calendar packed with free resources, here's what's inside your guide: Expert Curation: Navigate the digital landscape with expert advice from one of the leading voices in social media marketing.Organized for Success: Streamline your campaigns with easy-to-follow templates and tools that keep you focused and informed. No more guesswork or floundering.Engagement-Boosting Tactics: Maximize your reach and influence across platforms like TikTok, X, Facebook, Instagram, and LinkedIn.Exclusive Resources: Invaluable bonus materials to elevate your social media skills. But don't just take our word for it! Here's what readers are saying: "An absolute must for social media marketing! The best investment of the year!" - Sinead Canney, CEO, Aventuro Ireland"A game-changer for our business. Highly recommend it for anyone looking to up their social media game!" - Sinead Wilson, Principal Owner of My Remote Business Support"Transformed how I connect with clients and grow my network!" - David Kerin, Licensed Insurance AdvisorDon't miss out on the opportunity to upskill and transform your social media marketing approach. Get your Social Media Content Planner today and join a community of like-minded professionals achieving success in the digital age!

9 特價1101
立即代訂
下次再買

Mastering SEO Strategies for the Modern Web

Ingram 出版
2024/12/11 出版

Your Guide to Ranking Higher: A Business-Focused SEO Playbook Book DescriptionIn today's digital world, mastering Search Engine Optimization (SEO) is essential to stand out and thrive online. Mastering SEO Strategies for the Modern Web is your ultimate guide to transforming your website into a search engine powerhouse, driving traffic, and significantly boosting your visibility. You'll begin by understanding the core principles of SEO in the Introduction to SEO, learning why it's vital for your online success. Dive into Indexation and Keyword Research to uncover how search engines find and rank your content, and discover the best tools to choose the right keywords that will work for you. You will master Copywriting for SEO to create content that engages both your audience and search engines. You will leverage the power of Links to boost your site's authority and use Local SEO to effectively reach customers in your area. You will align your SEO efforts with your business goals in Business Strategy and SEO, and craft a successful plan in Content Strategy and SEO. You will optimize your website's performance with Technical SEO, stay ahead with the latest SEO Trends, and measure your progress through SEO Reporting. Whether you're just starting out or looking to refine your skills, Mastering SEO Strategies for the Modern Web will provide you with the essential knowledge and actionable tools to dominate search rankings and accelerate your business growth. Table of Contents1. Introduction to SEO2. Indexation3. Keyword Research4. Copywriting for SEO5. Links6. Local SEO7. Business Strategy and SEO8. Content Strategy and SEO9. Technical SEO Strategy10. SEO Trends11. SEO Reporting Index

9 特價1478
立即代訂
下次再買

A Generative Journey to AI

Ingram 出版
2024/12/11 出版

DESCRIPTION Explore the world of generative AI, a technology capable of creating new data that closely resembles reality. This book covers the fundamentals and advances through cutting-edge techniques. It also clarifies complex concepts, guiding you through the essentials of deep learning, neural networks, and the exciting world of generative models, like GANs, VAEs, Transformers, etc.This book introduces deep learning, machine learning, and neural networks as the foundation of generative models, covering types like GANs and VAEs, diffusion models, and other advanced architectures. It explains their structure, training methods, and applications across various fields. It discusses ethical considerations, responsible development, and future trends in generative AI. It concludes by highlighting how generative AI can be used creatively, transforming fields like art and pushing the boundaries of human creativity, while also addressing the challenges of using these technologies responsibly.This book provides the tools and knowledge needed to leverage generative AI in real-world applications. By the time you complete it, you will have a solid foundation and the confidence to explore the frontiers of AI.KEY FEATURES ● Comprehensive guide to mastering generative AI and deep learning basics.● Covers text, audio, and video generation with practical examples.● Insights into emerging trends and potential advancements in the field.WHAT YOU WILL LEARN● Understand the fundamentals of deep learning and neural networks.● Master generative models like GANs, VAEs, and Transformers.● Implement AI techniques for text, audio, and video creation.● Apply generative AI in real-world scenarios and applications.● Navigate ethical challenges and explore the future of AI.WHO THIS BOOK IS FORThis book is ideal for AI enthusiasts, developers, and professionals with a basic understanding of Python programming and machine learning.

9 特價2193
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/11 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verfiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價4175
立即代訂
下次再買

White Space Is Not Your Enemy

CRC Press 出版
2024/12/11 出版
9 特價7686
貨到通知
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/11 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價4175
立即代訂
下次再買

Bash Shell Scripting for Pentesters

Packt 出版
2024/12/10 出版

Level up your pentesting skills by learning how to perform advanced system reconnaissance, and streamline offensive operations with command-line scriptingKey Features: - Learn how to apply key attributes of Bash to accomplish common penetration testing tasks- Understand how Bash can connect to AI-driven tools to strengthen cybersecurity assessments- Configure a Bash environment with essential tools such as curl, openssl, nmap, and more- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Bash shell scripting is essential for penetration testing because it's versatile and efficient and integrates thoroughly with the Unix-based systems commonly used in cybersecurity assessments. In this book, the author leverages his decades of experience in IT and pentesting to help you automate repetitive tasks, rapidly analyze data, and craft sophisticated exploits, boosting your effectiveness and productivity.You'll get to grips with Bash basics, set up a hacking environment, and create basic scripts, before exploring file management, text processing, and manipulation. The chapters will guide you through advanced topics such as networking, parallel processing, and regular expressions. From there, the book will move on to practical applications, walking you through reconnaissance, web application and infrastructure pentesting, privilege escalation, persistence, and pivoting, all using Bash scripting. You'll also get a solid understanding of advanced topics, including evasion and obfuscation tactics, integrating AI into penetration testing workflows, and implementing DevSecOps practices.By the end of this book, you'll be well-versed with Bash shell scripting techniques tailored to penetration testing scenarios.What You Will Learn: - Understand Bash's role in pentesting and set up a suitable environment- Become proficient in file manipulation, navigation, and permissions- Find out how to use regex for text matching and manipulation- Extract and manipulate text efficiently using Bash- Utilize Bash functions and script organization to create an efficient workflow- Perform network enumeration, exploitation, and analysis using Bash- Harness the power of parallelism for more efficient task handling- Explore advanced subjects, including evasion, AI integration, and DevSecOps automationWho this book is for: This book is for penetration testers, cybersecurity professionals, and enthusiasts who want to enhance their skills with Bash shell scripting, as well as gain practical knowledge for automating tasks, analyzing data, and developing automation within penetration testing scenarios. A basic understanding of Unix-based systems and familiarity with fundamental penetration testing concepts are necessary.Table of Contents- Bash Command-Line and Its Hacking Environment- File and Directory Management- Variables, Conditionals, Loops, and Arrays- Regular Expressions- Functions and Script Organization- Bash Networking- Parallel Processing- Reconnaissance and Information Gathering- Web Application Pentesting with Bash- Network and Infrastructure Pentesting with Bash- Privilege Escalation in the Bash Shell- Persistence and Pivoting- Pentest Reporting with Bash- Evasion and Obfuscation- Interfacing with Artificial Intelligence- DevSecOps for Pentesters

9 特價2064
立即代訂
下次再買

Scalable Application Development with NestJS

Packt 出版
2024/12/10 出版

Build production-ready, scalable applications that stand up to enterprise demands with NestJS while learning all about APIs, GraphQL, and moreKey Features: - Understand the basics of robust modern apps, design patterns, and NestJS architecture- Build, test, and scale Rest APIs and GraphQL APIs using NestJS- Utilize microservice architecture, DevOps, security, and communication patterns for modern API development- Purchase of the print or Kindle book includes a free PDF eBookBook Description: In this book, Pacifique Linjanja, a globally recognized software engineer and open-source contributor, shares his deep technical expertise and practical insights from his extensive experience delivering enterprise-level applications to unpack the full potential of NestJS, the cutting-edge Node.js framework.This book covers the core concepts, design patterns, and best practices for building scalable, high-performance applications with NestJS. You'll learn REST API and GraphQL implementations, harness the power of microservices, and explore real-world case studies, including e-commerce, social networking, and ERP systems. The chapters provide step-by-step guidance for setting up your development environment with TypeScript and npm, structuring projects effectively, and using the Apollo Federation architecture to create efficient GraphQL APIs. This book offers hands-on guidance for testing and debugging APIs, handling exceptions, and validating data using pipes and guards, all while helping you build a complete NestJS application from scratch.By the end, you'll be ready to apply DevOps principles for continuous integration and deployment, as well as secure your NestJS applications using advanced techniques.What You Will Learn: - Master NestJS architecture and set up your environment with Node.js, npm, and TypeScript- Apply design patterns and best practices to build robust, maintainable apps- Build REST APIs and leverage GraphQL for flexible querying- Use microservices architecture to efficiently scale your applications- Understand how to test and debug APIs for optimal performance- Implement Apollo Federation for efficient GraphQL APIs in a federated system- Secure NestJS apps with advanced techniquesWho this book is for: If you are a software engineer, developer, or a tech lead looking to build scalable applications using NestJS, REST, GraphQL, and microservices, this book is for you. Whether you're new to NestJS or a seasoned developer, this guide will help you leverage NestJS for your next big project. It's also ideal for project managers and other IT professionals seeking insights into enterprise-level efficient development, testing strategies, and deployment processes. Even technology enthusiasts will find this book enlightening.Table of Contents- Overview of NestJS- Understanding Scalable Application Architecture Principles and Design Patterns- Setting Up Your NestJS Environment and Exploring NestJS - Building a Robust App- Advanced Concepts - Modules, Controllers, Providers, Exception Filters, Pipes, Guards, and Decorators- Building and Optimizing REST APIs with NestJS- Unleashing the Power of GraphQL and the Apollo Federation Architecture in NestJS- Testing and Debugging REST APIs in NestJS- Testing and Debugging GraphQL APIs in NestJS- Deep Dive into Microservices: Concepts and Architectural Styles- Building Scalable Microservices with NestJS- Testing and Debugging Microservices in NestJS- Case Study 1- E-commerce Application- Case Study 2- Social Networking Platform(N.B. Please use the Read Sample option to see further chapters)

9 特價1835
立即代訂
下次再買

Networking All-In-One for Dummies

Doug,Lowe  著
For Dummies 出版
2024/12/10 出版

The essentials you need to learn about networking--10 books in one! With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud networks--it's all covered. Learn how to set up a network and keep it functioning, using Windows Server, Linux, and related technologies. This book also covers best practices for security, managing mobile devices, and beyond. Maybe you're just getting started with networking, or maybe you know what you're doing and need a resource with all the knowledge in one place. Either way, you've found what you need with this Dummies All-in-One Plan a network from scratch and learn how to set up all the hardware and software you'll need Find explanations and examples of important networking protocols Build remote and cloud-based networks of various sizes Administer networks with Windows Server and other versions Secure your network with penetration testing and planning for cybersecurity incident responses Every network administrator needs a copy of Networking All-in-One For Dummies, the comprehensive learning resource and reliable desk reference.

9 特價1710
立即代訂
下次再買

Digital Ethics in the Age of AI

Julie,Mehan  著
Ingram 出版
2024/12/09 出版

In an era characterised by the remarkable growth of AI, there emerges a profound ethical dimension that demands our attention. This book presents a timely and significant addition to the ongoing discourse around the ethical implications of AI in general, as well as the new and disruptive AI technologies, such as generative AI platforms like ChatGPT. This book discusses: Digital technology disruption and AI;An overview of AI and generative AI;The role of AI and generative AI in misinformation and disinformation;AI and online disinhibition;How AI bias can occur;AI and job displacement;AI privacy issues; andAI regulation and policy.This book is a philosophical approach to the AI world, so it is of use to anyone curious about the moral issues surrounding advancements in AI, and not only for those who have a background in AI.

9 特價1692
立即代訂
下次再買

I 愛 AI

Sam,Lieblich  著
Ingram 出版
2024/12/09 出版

I 愛 AI is a book of essays, fiction, interviews and visual interventions that reintroduce sex, desire and politics into utopian fantasies of artificial intelligence, via psychoanalysis. Contributors bring their artistic practice, their style of living, or psychoanalytic theory, to demonstrate what AI, the thing, and AI the fantasy, is all about. Is it all it's cracked up to be? Is it just a mirage? And if there is such a thing, does it dream, does it love, is it afraid, can it want? Is there any emancipatory potential in there at all?Put it this way, sci-fi doesn't tell a rosy tale of our co-existence with AI, but the businessmen have been saying machine-intelligence will save the Earth since the first mechanical calculator started doing office work in 1863. We want to know, why are these imaginings so at odds? Surely phallic utopian conceptions of the singularity and all that surrounds it-mind uploads, brain implants, virtual therapists, virtual lovers, sexbots-can't be sustained when it's so clear that all the species of algorithmic harmony are really just more of the same, but faster.There is no choice but to reckon with the persistence of algorithmic control, and all that the cybernetic turn has given and taken; but do we need to hornily fantasise that the algorithm is our friend, our enemy, our equal? How in that reckoning do we account for indigenous knowledge practices, counteract repressive data surveillance, disavow the destruction of the land by the abstract algorithms in the sky? Can we honour human subjectivity as embodied, sensory, cultural, and inimitable without indulging in a blind anthropocentrism?Editor: Sam LieblichVisual Arts Editor: Anita SpoonerDesigner: James VinciguerraFeaturing work by: Steven RhallIsabel MillarJazz MoneyAngela GohSarah TheurerEmile FrankelThomas William SmithYing AngLing AngLuara Karlson-CarpVincent L礙Sam LieblichJulia ThwaitesMarcus lan McKenzie

9 特價1147
立即代訂
下次再買

Podcast Secrets for Entrepreneurs

John,North  著
Ingram 出版
2024/12/09 出版

Unlock the full potential of podcasting to build your brand, increase your influence, and drive revenue with Podcasting Secrets for Entrepreneurs. Whether you're a seasoned business owner or just starting, this guide equips you to create, launch, and grow a successful podcast that captivates your target audience and transforms listeners into loyal clients.Imagine reaching thousands of potential customers, all eager to learn from an expert in your field. Podcasting is one of the fastest-growing platforms, making it ideal for entrepreneurs looking to expand their reach. With Podcasting Secrets for Entrepreneurs, you'll discover how to harness this medium to create engaging, impactful content that resonates with your audience and establishes you as a leader in your industry.What's Inside?Step-by-Step Blueprint: From planning to post-launch growth, this book covers every podcasting phase, ensuring you avoid common pitfalls and achieve results.Secrets to Building an Engaged Audience: Learn techniques to attract and retain listeners, keeping them coming back with compelling episodes and insights.Expert Interview Tips: Host captivating interviews that highlight your expertise and create memorable conversations with industry leaders.Monetization Strategies: Generate revenue through sponsorships, merchandise, courses, and premium content. Monetize effectively with tips tailored for entrepreneurs.Marketing and Growth Hacks: From social media promotion to cross-platform engagement, unlock strategies to amplify your reach and turn listeners into clients.Who is this Book For?Podcasting Secrets for Entrepreneurs is designed for business owners, marketers, and brands ready to leverage podcasting as a high-impact marketing tool. Whether you're a coach, consultant, service provider, or digital content creator, this book provides insights to elevate your brand and boost visibility. No technical skills are required-just a passion for sharing knowledge and a co

9 特價1024
立即代訂
下次再買

Podcast Secrets for Entrepreneurs

John,North  著
Ingram 出版
2024/12/09 出版

Unlock the full potential of podcasting to build your brand, increase your influence, and drive revenue with Podcasting Secrets for Entrepreneurs. Whether you're a seasoned business owner or just starting, this guide equips you to create, launch, and grow a successful podcast that captivates your target audience and transforms listeners into loyal clients.Imagine reaching thousands of potential customers, all eager to learn from an expert in your field. Podcasting is one of the fastest-growing platforms, making it ideal for entrepreneurs looking to expand their reach. With Podcasting Secrets for Entrepreneurs, you'll discover how to harness this medium to create engaging, impactful content that resonates with your audience and establishes you as a leader in your industry.What's Inside?Step-by-Step Blueprint: From planning to post-launch growth, this book covers every podcasting phase, ensuring you avoid common pitfalls and achieve results.Secrets to Building an Engaged Audience: Learn techniques to attract and retain listeners, keeping them coming back with compelling episodes and insights.Expert Interview Tips: Host captivating interviews that highlight your expertise and create memorable conversations with industry leaders.Monetization Strategies: Generate revenue through sponsorships, merchandise, courses, and premium content. Monetize effectively with tips tailored for entrepreneurs.Marketing and Growth Hacks: From social media promotion to cross-platform engagement, unlock strategies to amplify your reach and turn listeners into clients.Who is this Book For?Podcasting Secrets for Entrepreneurs is designed for business owners, marketers, and brands ready to leverage podcasting as a high-impact marketing tool. Whether you're a coach, consultant, service provider, or digital content creator, this book provides insights to elevate your brand and boost visibility. No technical skills are required-just a passion for sharing knowledge and a co

9 特價2742
立即代訂
下次再買

Wi-Fi 7

Gang,Cheng  著
Springer 出版
2024/12/08 出版
9 特價2870
立即代訂
下次再買

Segment Routing for Service Provider and Enterprise Networks

Cisco Press 出版
2024/12/08 出版

Unlock the Future of Networking with Segment Routing: Your Comprehensive Guide to SR-MPLS and SRv6 for Service Provider and Enterprise Networks In the ever-evolving landscape of networking, this book is your essential resource for mastering the cutting-edge technology of Segment Routing (SR). Authored by industry experts, this book offers a deep dive into the world of SR, from foundational principles to advanced implementations. This guide begins with a brief recap of MPLS, setting the stage for an in-depth exploration of SR-MPLS and SRv6. Each chapter is meticulously crafted to provide a holistic understanding of SR, featuring practical examples and detailed configurations for both IOS-XR and IOS-XE platforms. Network engineers, architects, and operators will find invaluable insights and step-by-step instructions to effectively implement and manage SR technologies and overlay services. Beyond the technical details, the book delves into the business and organizationalimplications of adopting SR. Learn how SR can drive growth, improve customer experience, and streamline operations. With sections on SRv6 deployments in data centers and cloud environments, including lab support materials, you'll be ready for the next wave of networking innovations. Book features include: Practical insights drawn from real-world deployments, including diagrams, design guidelines, configuration examples, packet captures, and troubleshooting tips Logical progression from basic concepts to advanced implementations, suitable for both beginners and seasoned professionals Extensive configuration and verification examples for overlay services like L2VPN (EVPN) and L3VPN SRv6 open-source implementations for data centers and cloud environments Business-oriented chapters outlining the benefits of SR

9 特價3807
立即代訂
下次再買

Identification of NLOS nodes in VANETs for enhancing safety

Kaviarasan,R  著
Ingram 出版
2024/12/07 出版

NLOS nodes under emergency situation need to be effectively localized for supporting the vehicle under emergency to deliver essential information to the target vehicles in the stipulated time period. However, the majority of the existing NLOS localization incur huge overhead and time delay with reduced degree of channel utilization. In this research, three NLOS localization approaches that concentrate on range-based, range-optimizations and range-free detection process with an integrated framework are proposed for minimizing the overhead and time delay with maximized channel utilization rate.

9 特價3901
立即代訂
下次再買

Advancements in Cyber Crime Investigations and Modern Data Analytics

Ingram 出版
2024/12/06 出版

This book presents a fresh perspective on combating cybercrime, showcasing innovative solutions from experts across various fields. With the integration of artificial intelligence (AI), contemporary challenges are addressed with state-of-the-art strategies.

9 特價8352
立即代訂
下次再買

Cybersecurity

Ingram 出版
2024/12/06 出版

Cybersecurity: Safeguarding Our Digital World is a comprehensive guide to modern cybersecurity. It covers fundamentals through advanced concepts. The book explores technical innovations, threat landscapes, and practical security measures for individuals, organizations and governmental agencies, while it examines economic, ethical, and legal implications.Carefully researched and presented in eleven chapters, this book offers a comprehensive view of significant cybersecurity concepts, emerging technology, and the best approaches to maintain digital assets safe. Every chapter explores important subjects such the CIA triad, threat detection driven by artificial intelligence, cloud security, quantum cryptography, and offers insightful commentary grounded in extensive research.Cybersecurity: Safeguarding Our Digital World is a strong authoritative work in technology and security and it sets to become a canonical book in the subject with its in-depth scholarly written and forward-looking views from juggling privacy and security to negotiating world cybersecurity standards. It blends technical information with real-life experience and it is for everyone including but not limited to: Students and AcademicsCybersecurity ProfessionalsIndustry-Specific ProfessionalsBusiness Leaders and ExecutivesGeneral Technology EnthusiastsPolicymakers and Legal ExpertsSmall Business Owners and EntrepreneursIndividuals Concerned About Personal Cybersecurity.

9 特價1026
立即代訂
下次再買

Cybersecurity

Ingram 出版
2024/12/05 出版

Cybersecurity: Safeguarding Our Digital World is a comprehensive guide to modern cybersecurity. It covers fundamentals through advanced concepts. The book explores technical innovations, threat landscapes, and practical security measures for individuals, organizations and governmental agencies, while it examines economic, ethical, and legal implications. Carefully researched and presented in eleven chapters, this book offers a comprehensive view of significant cybersecurity concepts, emerging technology, and the best approaches to maintain digital assets safe. Every chapter explores important subjects such the CIA triad, threat detection driven by artificial intelligence, cloud security, quantum cryptography, and offers insightful commentary grounded in extensive research. Cybersecurity: Safeguarding Our Digital World is a strong authoritative work in technology and security and it sets to become a canonical book in the subject with its in-depth scholarly written and forward-looking views from juggling privacy and security to negotiating world cybersecurity standards. It blends technical information with real-life experience and it is for everyone including but not limited to: Students and AcademicsCybersecurity ProfessionalsIndustry-Specific ProfessionalsBusiness Leaders and ExecutivesGeneral Technology EnthusiastsPolicymakers and Legal ExpertsSmall Business Owners and EntrepreneursIndividuals Concerned About Personal Cybersecurity.

9 特價1368
立即代訂
下次再買
頁數19/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing