Guardians of the Digital Age
The internet wasn't built for time travelers. But when ethical hacker and mother Elsa and her 14-year-old son, Aiden, uncover a hidden code buried deep within cyberspace, they are pulled into a high-stakes journey through cybersecurity history--from the birth of ARPANET in 1969 to the AI-driven cyberwars of 2040. Their mission? Trace the origins of digital security before an unknown force alters history and reshapes the future of technology forever. As they jump across decades, they encounter internet pioneers, legendary hackers, and cyber-rebels who changed the digital world. But not everything in the past wants to stay in the past. Real dangers lurk in the timeline. Elsa and Aiden must navigate malware, mass surveillance, cyberwarfare, and a growing mystery that threatens the foundation of the internet itself. As they race against time, they also face their own fears and shifting trust in each other. A thrilling bridge between past and future, this book introduces parents and teens to the evolution of the internet and the most essential skill of our time--digital security. "The future is written in code--but cybersecurity is about trust and humanity. Will they protect it, or rewrite it?"
Traditional vs Generative AI Pentesting
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep dive into modern hacking techniques, demonstrating how AI-driven tools can enhance reconnaissance, exploitation, and reporting in cybersecurity assessments.Bridging the gap between manual pentesting and AI automation, this book equips readers with the skills and knowledge to leverage Generative AI for more efficient, adaptive, and intelligent security testing. By blending practical case studies, hands-on exercises, and theoretical insights, it guides cybersecurity professionals, researchers, and students through the next generation of offensive security strategies.The book offers comprehensive coverage of key topics, including: Traditional vs AI-Driven Pentesting: Understanding the evolution of security testing methodologies Building an AI-Powered Pentesting Lab: Leveraging Generative AI tools for reconnaissance and exploitation GenAI in Social Engineering and Attack Automation: Exploring AI-assisted phishing, deepfake attacks, and deception tactics Post-Exploitation and Privilege Escalation with AI: Enhancing persistence and lateral movement techniques Automating Penetration Testing Reports: Utilizing AI for streamlined documentation and risk analysis This book is an essential resource for ethical hackers, cybersecurity professionals, and academics seeking to explore the transformative role of Generative AI in penetration testing. It provides practical guidance, in-depth analysis, and cutting-edge techniques for mastering AI-driven offensive security.
Traditional vs Generative AI Pentesting
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep dive into modern hacking techniques, demonstrating how AI-driven tools can enhance reconnaissance, exploitation, and reporting in cybersecurity assessments.Bridging the gap between manual pentesting and AI automation, this book equips readers with the skills and knowledge to leverage Generative AI for more efficient, adaptive, and intelligent security testing. By blending practical case studies, hands-on exercises, and theoretical insights, it guides cybersecurity professionals, researchers, and students through the next generation of offensive security strategies.The book offers comprehensive coverage of key topics, including: Traditional vs AI-Driven Pentesting: Understanding the evolution of security testing methodologies Building an AI-Powered Pentesting Lab: Leveraging Generative AI tools for reconnaissance and exploitation GenAI in Social Engineering and Attack Automation: Exploring AI-assisted phishing, deepfake attacks, and deception tactics Post-Exploitation and Privilege Escalation with AI: Enhancing persistence and lateral movement techniques Automating Penetration Testing Reports: Utilizing AI for streamlined documentation and risk analysis This book is an essential resource for ethical hackers, cybersecurity professionals, and academics seeking to explore the transformative role of Generative AI in penetration testing. It provides practical guidance, in-depth analysis, and cutting-edge techniques for mastering AI-driven offensive security.
Data Engineering for Cybersecurity
Turn raw logs into real intelligence. Security teams rely on telemetry--the continuous stream of logs, events, metrics, and signals that reveal what's happening across systems, endpoints, and cloud services. But that data doesn't organize itself. It has to be collected, normalized, enriched, and secured before it becomes useful. That's where data engineering comes in. In this hands-on guide, cybersecurity engineer James Bonifield teaches you how to design and build scalable, secure data pipelines using free, open source tools such as Filebeat, Logstash, Redis, Kafka, and Elasticsearch and more. You'll learn how to collect telemetry from Windows including Sysmon and PowerShell events, Linux files and syslog, and streaming data from network and security appliances. You'll then transform it into structured formats, secure it in transit, and automate your deployments using Ansible. You'll also learn how to: Encrypt and secure data in transit using TLS and SSHCentrally manage code and configuration files using GitTransform messy logs into structured eventsEnrich data with threat intelligence using Redis and MemcachedStream and centralize data at scale with KafkaAutomate with Ansible for repeatable deploymentsWhether you're building a pipeline on a tight budget or deploying an enterprise-scale system, this book shows you how to centralize your security data, support real-time detection, and lay the groundwork for incident response and long-term forensics.
Modern REST API Development in Go
Master REST API design in Go in a pragmatic way by building production-ready web services using the Go standard library and idiomatic patternsKey Features: - Build scalable APIs using Go's robust standard library and HTTP tooling- Explore security, observability, and testing from a backend engineering perspective- Learn foundational REST principles by building a complete Go-based projectBook Description: Modern REST API Development in Go is a hands-on guide to understanding and applying REST principles using Go's powerful standard library. In an era where interconnected systems demand robust and performant APIs, Go offers the perfect combination of simplicity, performance, and tooling to build modern backend services.This book is centered around a complete, real-world REST API project and guides you through every stage of the development process, from building HTTP handlers to applying authentication and generating OpenAPI documentation. You'll learn to structure your application, handle persistence with common libraries like GORM and Squirrel, apply observability patterns through logging and tracing, and ensure code quality through unit and integration tests. Each concept is grounded in REST theory and backed by idiomatic Go practices, enabling you to build APIs that are not only functional but production-ready. By the end of the book, you'll be ready to design, build, and maintain REST APIs in Go.What You Will Learn: - Understand and implement HTTP handlers in Go- Create and manage RESTful routes- Persist and model data using GORM and Squirrel- Secure APIs with JWTs and basic authentication- Validate incoming requests with custom logic- Log and trace API activity for observability- Write unit and integration tests for endpoints- Generate API documentation using OpenAPIWho this book is for: This book is for developers who want to begin building REST APIs using the Go language. Whether you're new to Go or experienced in backend development, you'll gain practical skills and foundational knowledge to build secure, performant, and maintainable APIs. Ideal for backend engineers, system integrators, and full-stack developers entering the Go ecosystem.Table of Contents- Introduction to APIs- Exploring REST APIs- Building a REST Client- Designing Your REST API- Authentication and Authorization- Data Persistency- API Security- API Performance- Deploying Your API- Testing- Documenting with OpenAPI- Metrics, Logs, and Traces- Using GORM- Using the Echo Framework
Building Effective Privacy Programs
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications Offers strategies to integrate privacy principles into business processes and IT systems Covers industry-specific applications for healthcare, finance, and technology sectors Highlights successful privacy program implementations and lessons learned from enforcement actions Includes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.
The Computer Security Workbook
Mastering computer security requires more than just technical knowledge of software, systems and networks--it demands analytical thinking, a problem-solving mindset, and creative reasoning. These skills are best cultivated through practical challenges and structured problem-solving. This book presents a collection of questions and problems on a wide range of topics typically taught in introductory computer security courses, including basic concepts and principles, authentication techniques, access control models and methods, network security, software vulnerabilities, and malware. Topics and features: The content is organized into sections and chapters that are mostly self-contained, so readers can explore them in any order. This unique textbook/reference offers broad appeal: The exercises are intended to complement other learning materials and are tailored to different skill levels, allowing beginners to build a strong foundation while offering advanced challenges to more experienced learners.
Availability, Reliability and Security
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).
Availability, Reliability and Security
This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).
Availability, Reliability and Security
This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 42 full papers presented in this book were carefully reviewed and selected from 92 submissions. They contain papers of the following workshops: Part I: 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025); 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025); First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025); 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025). Part II: 5th workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025); 5th International Workshop on Security Testing and Monitoring (STAM 2025); 8th International Workshop on Emerging Network Security (ENS 2025).
Applying Automated Theorem Proving to Computer Security
Philosophy.Exe
We live in an age of unprecedented complexity, where technology, cognitive biases, and societal systems shape our decisions in ways we barely notice. The world is changing faster than our ability to make sense of it. Philosophy.exe is designed to bridge this gap, offering a mental toolkit to help navigate uncertainty, rethink assumptions, and make better decisions in a tech-driven world.Blending classical philosophy, cognitive science, AI ethics, and behavioral psychology, this book provides an adaptive framework for understanding the world. It challenges over-simplified models and rigid ideologies, encouraging readers to embrace complexity as a strategic advantage rather than a threat.What This Book Explores- Complexity Thinking - Why linear logic fails and how to develop a mindset that thrives in uncertainty.- Cognitive Biases & Decision-Making - How hidden mental shortcuts shape our beliefs, and how to counteract them.- Resilience & Mental Adaptability - Tools for maintaining clarity, focus, and critical thinking in a rapidly evolving landscape.- Technology & Human Autonomy - The philosophical and ethical challenges of AI, digital identity, and algorithmic decision-making.- Ethics Beyond Intentions - A pragmatic approach to decision-making that accounts for unintended consequences.Philosophy.exe is for those who seek to go beyond conventional wisdom--whether philosophers, strategists, leaders, or curious minds who question the narratives shaping modern life. It provides the tools to think deeply, adapt quickly, and engage critically in an era dominated by complexity and rapid technological evolution.In a world of misinformation, automation, and uncertainty, this book isn't just about philosophy--it's about survival.
Artificial Intelligence for Natural Language Processing
Artificial Intelligence for Natural Language Processing offers a comprehensive exploration of how advanced computational methods are transforming the way machines understand human language. This book delves into the core principles of Natural Language Processing through an engaging progression - from fundamental word-level analysis to complex discourse and pragmatic analysis - integrating linguistic theory with cutting-edge Artificial Intelligence methodologies. It provides a robust framework for both the theoretical underpinnings and practical applications of NLP, ensuring that readers gain a clear understanding of how computers can effectively process and interpret human language.What sets this book apart is its methodical structure that guides the reader through each level of language analysis, building upon earlier chapters to culminate in a deep integration of artificial intelligence within NLP systems. The detailed explanations and examples are designed to bridge the gap between abstract theory and real-world application, making it an invaluable resource for anyone looking to grasp the nuances of language processing.FEATURES Provides a step-by-step progression from word-level analysis to syntactic, semantic, and pragmatic processing Offers in-depth discussions on word sense disambiguation with illustrative examples Presents an exploration of discourse integration and contextual meaning essential for modern NLP models Delivers comprehensive coverage of AI applications in NLP, highlighting state-of-the-art computational techniques Suggests clear, accessible explanations suitable for both beginners and advanced practitioners This book is ideal for graduate students, researchers, and professionals in computer science, linguistics, and artificial intelligence. Whether you are a seasoned researcher looking to deepen your understanding or a newcomer eager to explore the field, Artificial Intelligence for Natural Language Processing serves as both an essential academic resource and a practical guide for navigating the evolving landscape of language technology.
Artificial Intelligence for Natural Language Processing
Artificial Intelligence for Natural Language Processing offers a comprehensive exploration of how advanced computational methods are transforming the way machines understand human language. This book delves into the core principles of Natural Language Processing through an engaging progression - from fundamental word-level analysis to complex discourse and pragmatic analysis - integrating linguistic theory with cutting-edge Artificial Intelligence methodologies. It provides a robust framework for both the theoretical underpinnings and practical applications of NLP, ensuring that readers gain a clear understanding of how computers can effectively process and interpret human language.What sets this book apart is its methodical structure that guides the reader through each level of language analysis, building upon earlier chapters to culminate in a deep integration of artificial intelligence within NLP systems. The detailed explanations and examples are designed to bridge the gap between abstract theory and real-world application, making it an invaluable resource for anyone looking to grasp the nuances of language processing.FEATURES Provides a step-by-step progression from word-level analysis to syntactic, semantic, and pragmatic processing Offers in-depth discussions on word sense disambiguation with illustrative examples Presents an exploration of discourse integration and contextual meaning essential for modern NLP models Delivers comprehensive coverage of AI applications in NLP, highlighting state-of-the-art computational techniques Suggests clear, accessible explanations suitable for both beginners and advanced practitioners This book is ideal for graduate students, researchers, and professionals in computer science, linguistics, and artificial intelligence. Whether you are a seasoned researcher looking to deepen your understanding or a newcomer eager to explore the field, Artificial Intelligence for Natural Language Processing serves as both an essential academic resource and a practical guide for navigating the evolving landscape of language technology.
From Day Zero to Zero Day
Find vulnerabilities before anyone else does. Zero days aren't magic--they're missed opportunities. From Day Zero to Zero Day teaches you how to find them before anyone else does. In this hands-on guide, award-winning white-hat hacker Eugene "Spaceraccoon" Lim breaks down the real-world process of vulnerability discovery. You'll retrace the steps behind past CVEs, analyze open source and embedded targets, and build a repeatable workflow for uncovering critical flaws in code. Whether you're new to vulnerability research or sharpening an existing skill set, this book will show you how to think--and work--like a bug hunter. You'll learn how to: Identify promising targets across codebases, protocols, and file formats. Trace code paths with taint analysis and map attack surfaces with precision.Reverse engineer binaries using Ghidra, Frida, and angr.Apply coverage-guided fuzzing, symbolic execution, and variant analysis.Build and validate proof-of-concept exploits to demonstrate real-world impact.More than a toolkit, this is a window into how top vulnerability researchers approach the work. You'll gain not just techniques but also the mindset to go deeper, ask better questions, and find what others miss. If you're ready to stop reading write-ups and start writing them, From Day Zero to Zero Day is your guide.
AI Rookies Labs Beginning NLP with Orange
AI Rookies Labs Learn Text Analytics and NLP using R
A smart Healthcare System
The book "Smart Healthcare Systems: Reducing False Predictions of Chronic Diseases Using IoT and Machine Learning" presents an innovative, cost-effective IoT-based Ambulatory Blood Pressure Monitoring (IABPM) system aimed at real-time tracking and early detection of Chronic Heart Disease (CHD). It leverages wearable sensors and cloud integration to record blood pressure and pulse data throughout the day, enhancing patient mobility and care. The system applies ML algorithms like Na簿ve Bayes, KNN, Decision Tree, SVM, and XGBoost to clinical datasets (SMHRCE and Kaggle) to predict Early Warning Scores (EWS). The proposed model shows high accuracy (up to 99.85%) and helps reduce healthcare costs, support proactive intervention, and improve diagnostic precision. The project bridges gaps in traditional ABPM systems by offering continuous monitoring, automated alerts, and cloud accessibility-paving the way for improved chronic disease management through technology integration.
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th International Conference on Next Generation Wired/Wireless Networking, NEW2AN 2024, and the 17th Conference on Internet of Things and Smart Spaces, ruSMART 2024, held in Marrakesh, Morocco, during December 11-12, 2024.The 48 full papers included in the joint proceedings were carefully reviewed and selected from 354 submissions. They address various aspects of next-generation data networks, with special attention to advanced wireless networking and applications. In particular, novel and innovative approaches to performance and effciency analysis of 5G and beyond systems, advanced queuing theory, and machine learning are demonstrated. Additionally, the papers focus on the Internet of Things, optics, signal processing, as well as digital Economy and business aspects.
Performance Evaluation and Benchmarking
This book constitutes the refereed proceedings of the 16th TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2024, held in Guangzhou, China, during August 30, 2024. The 7 full papers included in this book were carefully reviewed and selected from 12 submissions. The proceedings also include one invited talk and one paper based on a panel discussion with industry and academic leaders. The book focusses on providing vendors with a valuable tool to showcase the performance competitiveness of their current offerings while also aiding in the enhancement and tracking of products still in development.