0101~0102_天獄園2
1231~0102_金網寒假動漫節

英文書 > 全部商品

2025 Social Media Content Planner & Guide

2024/12/12 出版

Ready to Master Social Media in 2025 with Real Strategies for Real Success?Award-winning social media strategist and four-time best-selling author Louise McDonnell presents her essential guide for entrepreneurs, small businesses, and digital marketers eager to elevate their social media impact. With this comprehensive Social Media Content, you'll learn to plan, prioritize, and create high-quality content that saves time and boosts profits, making it a vital resource for any business owner.Drawing from over a decade of experience, Louise McDonnell shares practical insights and strategies that have helped countless business owners connect with their audience and achieve tangible results. With month-by-month inspiration, powerful content ideas, and an online content planning calendar packed with free resources, here's what's inside your guide: Expert Curation: Navigate the digital landscape with expert advice from one of the leading voices in social media marketing.Organized for Success: Streamline your campaigns with easy-to-follow templates and tools that keep you focused and informed. No more guesswork or floundering.Engagement-Boosting Tactics: Maximize your reach and influence across platforms like TikTok, X, Facebook, Instagram, and LinkedIn.Exclusive Resources: Invaluable bonus materials to elevate your social media skills. But don't just take our word for it! Here's what readers are saying: "An absolute must for social media marketing! The best investment of the year!" - Sinead Canney, CEO, Aventuro Ireland"A game-changer for our business. Highly recommend it for anyone looking to up their social media game!" - Sinead Wilson, Principal Owner of My Remote Business Support"Transformed how I connect with clients and grow my network!" - David Kerin, Licensed Insurance AdvisorDon't miss out on the opportunity to upskill and transform your social media marketing approach. Get your Social Media Content Planner today and join a community of like-minded professionals achieving success in the digital age!

9 特價1015
立即代訂
下次再買

Non-Line-Of-Sight Ultraviolet Communications

Renzhi,Yuan  著
Springer 出版
2024/12/12 出版

This book provides a comprehensive review and the latest progress of ultraviolet communications. Optical wireless communications employing electromagnetic waves in optical wavebands as information carriers can achieve higher communication bandwidth compared with radio frequency based wireless communication. However, the good directionality of optical waves degrades its non-line-of-sight transmission ability for avoiding obstacles. The ultraviolet communication employs the ultraviolet light in "solar blind" waveband (200-280 nm) as information carriers. The name "solar blind" is derived from the fact that the solar radiation in 200-280 nm is strongly absorbed by the ozone layer of the atmosphere such that little ultraviolet lights can reach the earth's surface. Therefore, ultraviolet communications enjoy low background radiation noise compared with other optical wireless communications. Besides, the strong absorption effect of ultraviolet lights in the atmosphere also guarantees a good local security due to the verified low-probability-of-detection. Therefore, the ultraviolet communication becomes a promising non-line-of-sight optical wireless communication technology and attracted increasing research attentions in recent decades. This book mainly focuses on the key principles and technologies of ultraviolet communications, including the channel modeling, achievable information rate, full-duplex ultraviolet communication, relay-assisted ultraviolet communication, non-line-of-sight ultraviolet positioning, and some future prospects of ultraviolet communications.

9 特價2870
貨到通知
下次再買

Podcast Studies

2024/12/12 出版

Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in academia, revealing its significant impact on scholarly communication and approaches to research and knowledge creation. This collection presents in-depth analyses from scholars who have integrated podcasting into their academic pursuits. The book systematically explores the medium's implications for teaching, its effectiveness in reaching broader audiences, and its role in reshaping the dissemination of academic work. Covering a spectrum of disciplines, the contributors detail their engagement with podcasting, providing insight into its use as both a research tool and an object of analysis, thereby illuminating the multifaceted ways in which podcasting intersects with and influences academic life. The volume provides substantive evidence of podcasting's transformative effect on academia, offering reflections on its potential to facilitate a more accessible and engaging form of scholarly output. By presenting case studies and empirical research, Podcast Studies: Practice into Theory underscores the originality of podcasting as an academic endeavor and its utility in expanding the reach and impact of scholarly work. It serves as a key resource for academics, researchers, and practitioners interested in the application and study of podcasting as a novel vector for knowledge creation and distribution.

9 特價3848
貨到通知
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/12 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價3815
立即代訂
下次再買

A Generative Journey to AI

2024/12/11 出版

DESCRIPTION Explore the world of generative AI, a technology capable of creating new data that closely resembles reality. This book covers the fundamentals and advances through cutting-edge techniques. It also clarifies complex concepts, guiding you through the essentials of deep learning, neural networks, and the exciting world of generative models, like GANs, VAEs, Transformers, etc.This book introduces deep learning, machine learning, and neural networks as the foundation of generative models, covering types like GANs and VAEs, diffusion models, and other advanced architectures. It explains their structure, training methods, and applications across various fields. It discusses ethical considerations, responsible development, and future trends in generative AI. It concludes by highlighting how generative AI can be used creatively, transforming fields like art and pushing the boundaries of human creativity, while also addressing the challenges of using these technologies responsibly.This book provides the tools and knowledge needed to leverage generative AI in real-world applications. By the time you complete it, you will have a solid foundation and the confidence to explore the frontiers of AI.KEY FEATURES ● Comprehensive guide to mastering generative AI and deep learning basics.● Covers text, audio, and video generation with practical examples.● Insights into emerging trends and potential advancements in the field.WHAT YOU WILL LEARN● Understand the fundamentals of deep learning and neural networks.● Master generative models like GANs, VAEs, and Transformers.● Implement AI techniques for text, audio, and video creation.● Apply generative AI in real-world scenarios and applications.● Navigate ethical challenges and explore the future of AI.WHO THIS BOOK IS FORThis book is ideal for AI enthusiasts, developers, and professionals with a basic understanding of Python programming and machine learning.

9 特價2013
立即代訂
下次再買

Mastering SEO Strategies for the Modern Web

2024/12/11 出版

Your Guide to Ranking Higher: A Business-Focused SEO Playbook Book DescriptionIn today's digital world, mastering Search Engine Optimization (SEO) is essential to stand out and thrive online. Mastering SEO Strategies for the Modern Web is your ultimate guide to transforming your website into a search engine powerhouse, driving traffic, and significantly boosting your visibility. You'll begin by understanding the core principles of SEO in the Introduction to SEO, learning why it's vital for your online success. Dive into Indexation and Keyword Research to uncover how search engines find and rank your content, and discover the best tools to choose the right keywords that will work for you. You will master Copywriting for SEO to create content that engages both your audience and search engines. You will leverage the power of Links to boost your site's authority and use Local SEO to effectively reach customers in your area. You will align your SEO efforts with your business goals in Business Strategy and SEO, and craft a successful plan in Content Strategy and SEO. You will optimize your website's performance with Technical SEO, stay ahead with the latest SEO Trends, and measure your progress through SEO Reporting. Whether you're just starting out or looking to refine your skills, Mastering SEO Strategies for the Modern Web will provide you with the essential knowledge and actionable tools to dominate search rankings and accelerate your business growth. Table of Contents1. Introduction to SEO2. Indexation3. Keyword Research4. Copywriting for SEO5. Links6. Local SEO7. Business Strategy and SEO8. Content Strategy and SEO9. Technical SEO Strategy10. SEO Trends11. SEO Reporting Index

9 特價1479
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/11 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價3815
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/11 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verfiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價3815
立即代訂
下次再買

White Space Is Not Your Enemy

CRC Press 出版
2024/12/11 出版
9 特價7686
貨到通知
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2024/12/11 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價3914
貨到通知
下次再買

Networking All-In-One for Dummies

Doug,Lowe  著
For Dummies 出版
2024/12/10 出版

The essentials you need to learn about networking--10 books in one! With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud networks--it's all covered. Learn how to set up a network and keep it functioning, using Windows Server, Linux, and related technologies. This book also covers best practices for security, managing mobile devices, and beyond. Maybe you're just getting started with networking, or maybe you know what you're doing and need a resource with all the knowledge in one place. Either way, you've found what you need with this Dummies All-in-One Plan a network from scratch and learn how to set up all the hardware and software you'll need Find explanations and examples of important networking protocols Build remote and cloud-based networks of various sizes Administer networks with Windows Server and other versions Secure your network with penetration testing and planning for cybersecurity incident responses Every network administrator needs a copy of Networking All-in-One For Dummies, the comprehensive learning resource and reliable desk reference.

9 特價1710
立即代訂
下次再買

Cyber Recon

Wiley 出版
2024/12/10 出版

An up close and personal look at cyber espionage and digital spycraft In Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation, 30-year cybersecurity veteran Kurtis Minder delivers a fascinating exploration of real-world cyber espionage in some of the most dangerous places on the Internet. Through his experiences watching and hunting cybercriminals as varied as lone wolfs, the Russian mafia, and other official and unofficial nation-state hackers, he explains how cyber espionage is performed, the tools and skills that people like him use all the time, and the consequences of engaging with cybercriminals on a daily basis. Kurtis teaches you that the same operational security that keeps him and his team of spies safe will keep you and your organization's secrets safer too. And you'll explore whether fake personas on the internet are always bad or are there legitimate business uses for Romanian speaking sock puppets? You'll also discover critical lessons that Minder has learned as he's led his digital risk company, GroupSense, through many of the most dramatic incidents of online crime of the last few decades. Inside the book: Original profiles of cyber espionage and negotiation professionals so you're learning from Jax Scott, Jon DiMaggio, Jason Ingalls, Beau Woods, Brye Ravattine and many more, with QR-code links to extended YouTube interviews An original, non-technical primer on the people that populate the cyber risk landscape and the methods they use to carry out attacks Steps to avoid becoming a target of Lockbit, BlackMatter, NotPetya, and next year's most dangerous ransomware as well as how to minimize the business damage when you are a victim How the intersection of business negotiation and hostage negotiation relates to high-stakes ransomware negotiations The fast-moving transformation generative AI is unleashing in cyber attacks and defense An inside look at an endlessly interesting corner of the field of cybersecurity, Cyber Recon is also a must-read for anyone interested in spycraft, technology, hacking, or digital entrepreneurship.

9 特價958
立即代訂
下次再買

Advanced Cybersecurity Solutions

2024/12/10 出版

Advanced Cybersecurity Solutions - Your Shield in the Digital StormThe cybersecurity battleground isn't just about technology - it's about evolving faster than relentless attackers. "Advanced Cybersecurity Solutions" is your tactical guide to outsmarting threats, safeguarding data, and building a company culture where security isn't an afterthought, it's the foundation for success.Key Themes Explored: The Enemy Evolves, So Must You: Discover the cutting-edge tactics of cybercriminals, state-sponsored hackers, and the thriving underground market fueling attacks. This isn't about FUD (Fear, Uncertainty, Doubt); it's about real-world case studies that show you what you're up against.Beyond Buzzwords: Zero Trust, AI, and Resilience: Demystify the essential concepts that form the basis of modern defense. Learn how zero-trust architectures replace blind faith with granular security, how AI can be both your shield and a potential weapon, and how to train your most important asset - your people - to be a wall against social engineering.The Cloud, IoT, and the Dangers Beyond Your Firewall: The lines are blurred-your data isn't just on servers anymore. Explore strategies for securing cloud supply chains, the wild landscape of IoT devices, and the compliance complexities surrounding global privacy regulations.When (Not If) Things Go Wrong: Every second counts when a breach happens. Master the incident response playbook, from containment to forensics and the delicate art of rebuilding trust through transparent communication.Outsmart the Hackers: Think like your adversary to stay one step ahead. Dive into the world of penetration testing, honeypots, threat hunting, and how even the dark web can be turned into a source of vital intelligence.This book is essential if you are: A CISO or IT leader navigating the ever-changing threat landscape.A business owner wanting to reduce risk and protect your company's reputation.Anyone concerned about how to safeguard your data when the risks come from all sides.More Than Tech - It's a Mindset"Advanced Cybersecurity Solutions" goes further than tool recommendations. It's about mindset shifts, embedding security awareness into your company culture, and understanding the ethical dilemmas of a world where surveillance and privacy are in constant conflict. You'll grapple with the challenges of an AI-powered cyber arms race, the vulnerabilities in our increasingly connected hardware, and the critical need for deception in turning the tables on attackers.What sets this book apart: Real-World Focus: Theory is important, but the battle is being fought right now. Case studies, practical strategies, and battle-tested tactics are woven throughout the book.Beyond the Tech Expert: Written to be accessible even if you don't have a deep technical background. Understand the "why" behind the solutions, not just the "how."Emerging Trends: Stay ahead with sections on the disruptive potential of quantum computing, the dangers of advanced malware, and the potential future of cybersecurity regulation worldwide.Don't just defend yourself. Outthink, outmaneuver, and build a resilient organization that thrives in the digital age.Arm yourself with "Advanced Cybersecurity Solutions."

9 特價693
立即代訂
下次再買

Bash Shell Scripting for Pentesters

Packt 出版
2024/12/10 出版

Level up your pentesting skills by learning how to perform advanced system reconnaissance, and streamline offensive operations with command-line scriptingKey Features: - Learn how to apply key attributes of Bash to accomplish common penetration testing tasks- Understand how Bash can connect to AI-driven tools to strengthen cybersecurity assessments- Configure a Bash environment with essential tools such as curl, openssl, nmap, and more- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Bash shell scripting is essential for penetration testing because it's versatile and efficient and integrates thoroughly with the Unix-based systems commonly used in cybersecurity assessments. In this book, the author leverages his decades of experience in IT and pentesting to help you automate repetitive tasks, rapidly analyze data, and craft sophisticated exploits, boosting your effectiveness and productivity.You'll get to grips with Bash basics, set up a hacking environment, and create basic scripts, before exploring file management, text processing, and manipulation. The chapters will guide you through advanced topics such as networking, parallel processing, and regular expressions. From there, the book will move on to practical applications, walking you through reconnaissance, web application and infrastructure pentesting, privilege escalation, persistence, and pivoting, all using Bash scripting. You'll also get a solid understanding of advanced topics, including evasion and obfuscation tactics, integrating AI into penetration testing workflows, and implementing DevSecOps practices.By the end of this book, you'll be well-versed with Bash shell scripting techniques tailored to penetration testing scenarios.What You Will Learn: - Understand Bash's role in pentesting and set up a suitable environment- Become proficient in file manipulation, navigation, and permissions- Find out how to use regex for text matching and manipulation- Extract and manipulate text efficiently using Bash- Utilize Bash functions and script organization to create an efficient workflow- Perform network enumeration, exploitation, and analysis using Bash- Harness the power of parallelism for more efficient task handling- Explore advanced subjects, including evasion, AI integration, and DevSecOps automationWho this book is for: This book is for penetration testers, cybersecurity professionals, and enthusiasts who want to enhance their skills with Bash shell scripting, as well as gain practical knowledge for automating tasks, analyzing data, and developing automation within penetration testing scenarios. A basic understanding of Unix-based systems and familiarity with fundamental penetration testing concepts are necessary.Table of Contents- Bash Command-Line and Its Hacking Environment- File and Directory Management- Variables, Conditionals, Loops, and Arrays- Regular Expressions- Functions and Script Organization- Bash Networking- Parallel Processing- Reconnaissance and Information Gathering- Web Application Pentesting with Bash- Network and Infrastructure Pentesting with Bash- Privilege Escalation in the Bash Shell- Persistence and Pivoting- Pentest Reporting with Bash- Evasion and Obfuscation- Interfacing with Artificial Intelligence- DevSecOps for Pentesters

9 特價1904
立即代訂
下次再買

Scalable Application Development with NestJS

Packt 出版
2024/12/10 出版

Build production-ready, scalable applications that stand up to enterprise demands with NestJS while learning all about APIs, GraphQL, and moreKey Features: - Understand the basics of robust modern apps, design patterns, and NestJS architecture- Build, test, and scale Rest APIs and GraphQL APIs using NestJS- Utilize microservice architecture, DevOps, security, and communication patterns for modern API development- Purchase of the print or Kindle book includes a free PDF eBookBook Description: In this book, Pacifique Linjanja, a globally recognized software engineer and open-source contributor, shares his deep technical expertise and practical insights from his extensive experience delivering enterprise-level applications to unpack the full potential of NestJS, the cutting-edge Node.js framework.This book covers the core concepts, design patterns, and best practices for building scalable, high-performance applications with NestJS. You'll learn REST API and GraphQL implementations, harness the power of microservices, and explore real-world case studies, including e-commerce, social networking, and ERP systems. The chapters provide step-by-step guidance for setting up your development environment with TypeScript and npm, structuring projects effectively, and using the Apollo Federation architecture to create efficient GraphQL APIs. This book offers hands-on guidance for testing and debugging APIs, handling exceptions, and validating data using pipes and guards, all while helping you build a complete NestJS application from scratch.By the end, you'll be ready to apply DevOps principles for continuous integration and deployment, as well as secure your NestJS applications using advanced techniques.What You Will Learn: - Master NestJS architecture and set up your environment with Node.js, npm, and TypeScript- Apply design patterns and best practices to build robust, maintainable apps- Build REST APIs and leverage GraphQL for flexible querying- Use microservices architecture to efficiently scale your applications- Understand how to test and debug APIs for optimal performance- Implement Apollo Federation for efficient GraphQL APIs in a federated system- Secure NestJS apps with advanced techniquesWho this book is for: If you are a software engineer, developer, or a tech lead looking to build scalable applications using NestJS, REST, GraphQL, and microservices, this book is for you. Whether you're new to NestJS or a seasoned developer, this guide will help you leverage NestJS for your next big project. It's also ideal for project managers and other IT professionals seeking insights into enterprise-level efficient development, testing strategies, and deployment processes. Even technology enthusiasts will find this book enlightening.Table of Contents- Overview of NestJS- Understanding Scalable Application Architecture Principles and Design Patterns- Setting Up Your NestJS Environment and Exploring NestJS - Building a Robust App- Advanced Concepts - Modules, Controllers, Providers, Exception Filters, Pipes, Guards, and Decorators- Building and Optimizing REST APIs with NestJS- Unleashing the Power of GraphQL and the Apollo Federation Architecture in NestJS- Testing and Debugging REST APIs in NestJS- Testing and Debugging GraphQL APIs in NestJS- Deep Dive into Microservices: Concepts and Architectural Styles- Building Scalable Microservices with NestJS- Testing and Debugging Microservices in NestJS- Case Study 1- E-commerce Application- Case Study 2- Social Networking Platform(N.B. Please use the Read Sample option to see further chapters)

9 特價1835
立即代訂
下次再買

Podcast Secrets for Entrepreneurs

John,North  著
2024/12/09 出版

Unlock the full potential of podcasting to build your brand, increase your influence, and drive revenue with Podcasting Secrets for Entrepreneurs. Whether you're a seasoned business owner or just starting, this guide equips you to create, launch, and grow a successful podcast that captivates your target audience and transforms listeners into loyal clients.Imagine reaching thousands of potential customers, all eager to learn from an expert in your field. Podcasting is one of the fastest-growing platforms, making it ideal for entrepreneurs looking to expand their reach. With Podcasting Secrets for Entrepreneurs, you'll discover how to harness this medium to create engaging, impactful content that resonates with your audience and establishes you as a leader in your industry.What's Inside?Step-by-Step Blueprint: From planning to post-launch growth, this book covers every podcasting phase, ensuring you avoid common pitfalls and achieve results.Secrets to Building an Engaged Audience: Learn techniques to attract and retain listeners, keeping them coming back with compelling episodes and insights.Expert Interview Tips: Host captivating interviews that highlight your expertise and create memorable conversations with industry leaders.Monetization Strategies: Generate revenue through sponsorships, merchandise, courses, and premium content. Monetize effectively with tips tailored for entrepreneurs.Marketing and Growth Hacks: From social media promotion to cross-platform engagement, unlock strategies to amplify your reach and turn listeners into clients.Who is this Book For?Podcasting Secrets for Entrepreneurs is designed for business owners, marketers, and brands ready to leverage podcasting as a high-impact marketing tool. Whether you're a coach, consultant, service provider, or digital content creator, this book provides insights to elevate your brand and boost visibility. No technical skills are required-just a passion for sharing knowledge and a co

9 特價943
立即代訂
下次再買

Podcast Secrets for Entrepreneurs

John,North  著
2024/12/09 出版

Unlock the full potential of podcasting to build your brand, increase your influence, and drive revenue with Podcasting Secrets for Entrepreneurs. Whether you're a seasoned business owner or just starting, this guide equips you to create, launch, and grow a successful podcast that captivates your target audience and transforms listeners into loyal clients.Imagine reaching thousands of potential customers, all eager to learn from an expert in your field. Podcasting is one of the fastest-growing platforms, making it ideal for entrepreneurs looking to expand their reach. With Podcasting Secrets for Entrepreneurs, you'll discover how to harness this medium to create engaging, impactful content that resonates with your audience and establishes you as a leader in your industry.What's Inside?Step-by-Step Blueprint: From planning to post-launch growth, this book covers every podcasting phase, ensuring you avoid common pitfalls and achieve results.Secrets to Building an Engaged Audience: Learn techniques to attract and retain listeners, keeping them coming back with compelling episodes and insights.Expert Interview Tips: Host captivating interviews that highlight your expertise and create memorable conversations with industry leaders.Monetization Strategies: Generate revenue through sponsorships, merchandise, courses, and premium content. Monetize effectively with tips tailored for entrepreneurs.Marketing and Growth Hacks: From social media promotion to cross-platform engagement, unlock strategies to amplify your reach and turn listeners into clients.Who is this Book For?Podcasting Secrets for Entrepreneurs is designed for business owners, marketers, and brands ready to leverage podcasting as a high-impact marketing tool. Whether you're a coach, consultant, service provider, or digital content creator, this book provides insights to elevate your brand and boost visibility. No technical skills are required-just a passion for sharing knowledge and a co

9 特價1573
立即代訂
下次再買

I 愛 AI

Sam,Lieblich  著
2024/12/09 出版

I 愛 AI is a book of essays, fiction, interviews and visual interventions that reintroduce sex, desire and politics into utopian fantasies of artificial intelligence, via psychoanalysis. Contributors bring their artistic practice, their style of living, or psychoanalytic theory, to demonstrate what AI, the thing, and AI the fantasy, is all about. Is it all it's cracked up to be? Is it just a mirage? And if there is such a thing, does it dream, does it love, is it afraid, can it want? Is there any emancipatory potential in there at all?Put it this way, sci-fi doesn't tell a rosy tale of our co-existence with AI, but the businessmen have been saying machine-intelligence will save the Earth since the first mechanical calculator started doing office work in 1863. We want to know, why are these imaginings so at odds? Surely phallic utopian conceptions of the singularity and all that surrounds it-mind uploads, brain implants, virtual therapists, virtual lovers, sexbots-can't be sustained when it's so clear that all the species of algorithmic harmony are really just more of the same, but faster.There is no choice but to reckon with the persistence of algorithmic control, and all that the cybernetic turn has given and taken; but do we need to hornily fantasise that the algorithm is our friend, our enemy, our equal? How in that reckoning do we account for indigenous knowledge practices, counteract repressive data surveillance, disavow the destruction of the land by the abstract algorithms in the sky? Can we honour human subjectivity as embodied, sensory, cultural, and inimitable without indulging in a blind anthropocentrism?Editor: Sam LieblichVisual Arts Editor: Anita SpoonerDesigner: James VinciguerraFeaturing work by: Steven RhallIsabel MillarJazz MoneyAngela GohSarah TheurerEmile FrankelThomas William SmithYing AngLing AngLuara Karlson-CarpVincent L礙Sam LieblichJulia ThwaitesMarcus lan McKenzie

9 特價1148
立即代訂
下次再買

Digital Ethics in the Age of AI

Julie,Mehan  著
Itgp 出版
2024/12/09 出版

In an era characterised by the remarkable growth of AI, there emerges a profound ethical dimension that demands our attention. This book presents a timely and significant addition to the ongoing discourse around the ethical implications of AI in general, as well as the new and disruptive AI technologies, such as generative AI platforms like ChatGPT. This book discusses: Digital technology disruption and AI;An overview of AI and generative AI;The role of AI and generative AI in misinformation and disinformation;AI and online disinhibition;How AI bias can occur;AI and job displacement;AI privacy issues; andAI regulation and policy.This book is a philosophical approach to the AI world, so it is of use to anyone curious about the moral issues surrounding advancements in AI, and not only for those who have a background in AI.

9 特價1548
立即代訂
下次再買

Wi-Fi 7

Gang,Cheng  著
Springer 出版
2024/12/08 出版
9 特價2623
立即代訂
下次再買

Segment Routing for Service Provider and Enterprise Networks

Cisco Press 出版
2024/12/08 出版

Unlock the Future of Networking with Segment Routing: Your Comprehensive Guide to SR-MPLS and SRv6 for Service Provider and Enterprise Networks In the ever-evolving landscape of networking, this book is your essential resource for mastering the cutting-edge technology of Segment Routing (SR). Authored by industry experts, this book offers a deep dive into the world of SR, from foundational principles to advanced implementations. This guide begins with a brief recap of MPLS, setting the stage for an in-depth exploration of SR-MPLS and SRv6. Each chapter is meticulously crafted to provide a holistic understanding of SR, featuring practical examples and detailed configurations for both IOS-XR and IOS-XE platforms. Network engineers, architects, and operators will find invaluable insights and step-by-step instructions to effectively implement and manage SR technologies and overlay services. Beyond the technical details, the book delves into the business and organizationalimplications of adopting SR. Learn how SR can drive growth, improve customer experience, and streamline operations. With sections on SRv6 deployments in data centers and cloud environments, including lab support materials, you'll be ready for the next wave of networking innovations. Book features include: Practical insights drawn from real-world deployments, including diagrams, design guidelines, configuration examples, packet captures, and troubleshooting tips Logical progression from basic concepts to advanced implementations, suitable for both beginners and seasoned professionals Extensive configuration and verification examples for overlay services like L2VPN (EVPN) and L3VPN SRv6 open-source implementations for data centers and cloud environments Business-oriented chapters outlining the benefits of SR

9 特價3483
立即代訂
下次再買

Identification of NLOS nodes in VANETs for enhancing safety

Kaviarasan,R  著
2024/12/07 出版

NLOS nodes under emergency situation need to be effectively localized for supporting the vehicle under emergency to deliver essential information to the target vehicles in the stipulated time period. However, the majority of the existing NLOS localization incur huge overhead and time delay with reduced degree of channel utilization. In this research, three NLOS localization approaches that concentrate on range-based, range-optimizations and range-free detection process with an integrated framework are proposed for minimizing the overhead and time delay with maximized channel utilization rate.

9 特價3596
立即代訂
下次再買

Cybersecurity

Justin Kojok 出版
2024/12/06 出版

Cybersecurity: Safeguarding Our Digital World is a comprehensive guide to modern cybersecurity. It covers fundamentals through advanced concepts. The book explores technical innovations, threat landscapes, and practical security measures for individuals, organizations and governmental agencies, while it examines economic, ethical, and legal implications.Carefully researched and presented in eleven chapters, this book offers a comprehensive view of significant cybersecurity concepts, emerging technology, and the best approaches to maintain digital assets safe. Every chapter explores important subjects such the CIA triad, threat detection driven by artificial intelligence, cloud security, quantum cryptography, and offers insightful commentary grounded in extensive research.Cybersecurity: Safeguarding Our Digital World is a strong authoritative work in technology and security and it sets to become a canonical book in the subject with its in-depth scholarly written and forward-looking views from juggling privacy and security to negotiating world cybersecurity standards. It blends technical information with real-life experience and it is for everyone including but not limited to: Students and AcademicsCybersecurity ProfessionalsIndustry-Specific ProfessionalsBusiness Leaders and ExecutivesGeneral Technology EnthusiastsPolicymakers and Legal ExpertsSmall Business Owners and EntrepreneursIndividuals Concerned About Personal Cybersecurity.

9 特價945
立即代訂
下次再買

Advancements in Cyber Crime Investigations and Modern Data Analytics

CRC Press 出版
2024/12/06 出版

This book presents a fresh perspective on combating cyber crime, showcasing innovative solutions from experts across various fields. With the integration of artificial intelligence (AI), contemporary challenges are addressed with state-of-the-art strategies. The book discusses a wide range of timely issues within the domain of cyber crime and investigation, emphasizing AI-driven solutions and future multidisciplinary perspectives. As data becomes central to all digital interactions, it also becomes increasingly vulnerable, making it a prime target for adversaries. This comprehensive volume compiles technical approaches to counter, investigate, and manage these complex avenues of misconduct under the umbrella of "Cyber Crime".Key Topics: LLMs as a Solution for SARs Triaging Technical Capacities to Counter CSAM A Journey of Mobile Forensic Investigation Digital Forensics Solving Financial Crimes Deepfake-Driven Financial Crimes and Countermeasures This book offers a thorough examination of the current landscape of cyber crime, the capabilities available to combat it, and the advanced measures required to stay ahead. A detailed roadmap of digital forensics, the science of decrypting cyber crime, is a key highlight, alongside an exploration of the rising capabilities of AI. We extend our gratitude to all the contributors and hope this book answers many questions while igniting curiosity and providing a stimulating intellectual experience.

9 特價6678
立即代訂
下次再買

Cybersecurity

Justin Kojok 出版
2024/12/05 出版

Cybersecurity: Safeguarding Our Digital World is a comprehensive guide to modern cybersecurity. It covers fundamentals through advanced concepts. The book explores technical innovations, threat landscapes, and practical security measures for individuals, organizations and governmental agencies, while it examines economic, ethical, and legal implications. Carefully researched and presented in eleven chapters, this book offers a comprehensive view of significant cybersecurity concepts, emerging technology, and the best approaches to maintain digital assets safe. Every chapter explores important subjects such the CIA triad, threat detection driven by artificial intelligence, cloud security, quantum cryptography, and offers insightful commentary grounded in extensive research. Cybersecurity: Safeguarding Our Digital World is a strong authoritative work in technology and security and it sets to become a canonical book in the subject with its in-depth scholarly written and forward-looking views from juggling privacy and security to negotiating world cybersecurity standards. It blends technical information with real-life experience and it is for everyone including but not limited to: Students and AcademicsCybersecurity ProfessionalsIndustry-Specific ProfessionalsBusiness Leaders and ExecutivesGeneral Technology EnthusiastsPolicymakers and Legal ExpertsSmall Business Owners and EntrepreneursIndividuals Concerned About Personal Cybersecurity.

9 特價1260
立即代訂
下次再買

Advances in Secure IoT Data Sharing

Phu,Nguyen  著
Now Publishers 出版
2024/12/05 出版

The proliferation of IoT devices on the internet is currently in the billions, and projections anticipate that there will be 50 billion connected IoT devices in the market by 2030. This rapid expansion will result in a substantial increase in data, which includes personal data, generated by these IoT devices. It is estimated that the data volume will reach 73.1 zettabytes by 2025. To fully realize the substantial benefits of the IoT, it is imperative to facilitate the responsible utilization and sharing of this data among various stakeholders. However, it is crucial to establish robust security and trust mechanisms to ensure data integrity and privacy during data sharing. This monograph summarizes and assesses the research efforts that address secure IoT data sharing. State-of-the-art techniques ensuring and preserving security in the IoT data-sharing environment have been systematically reviewed, through a systematic literature study (SLR). Three research questions have been posed, the selection and exclusion criteria for primary studies have been defined, and data from these studies have been extracted and synthesized to answer the research questions. The SLR results can help readers to obtain (i) an overview of existing secure IoT data-sharing approaches and related issues, (ii) a deep-dive into Edge-focused secure IoT data sharing solutions, and (iii) research directions that require attention from the research community for follow-up work.

9 特價2750
立即代訂
下次再買

Mastering Cybersecurity

CRC Press 出版
2024/12/05 出版

In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes.Volume 1: The first volume starts with the fundamentals and hands-on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn't just about identifying weaknesses; it's about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You'll also learn live hunting for vulnerable devices and systems on the Internet.Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of open-source intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the internet of things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web - a hidden corner of the internet - and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.The two volumes will empower you to become a well-rounded cybersecurity professional, prepared to defend against today's ever-increasing threats.

9 特價2861
立即代訂
下次再買

Microsoft Defender for Identity in Depth

Pierre,Thoor  著
Packt 出版
2024/12/05 出版

Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against evolving cyber threatsKey Features: - Optimize configurations for peak security performance by tailoring detection thresholds- Leverage real-world insights and case studies to improve threat detection and response strategies- Establish a strong ITDR defense with Microsoft Defender for Identity- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Written by a recognized cybersecurity expert, Microsoft Defender for Identity in Depth not only lays the groundwork for deploying and managing MDI, but also takes your knowledge to expert levels, enabling you to strengthen your organization against the most advanced cyber threats.You'll familiarize yourself with the essentials of MDI, from seamless setup to leveraging PowerShell for automation, setting the stage for exploring advanced integrations and capabilities. Through practical, real-world examples, you'll learn how to extend MDI's reach by using APIs and conducting proactive threat hunting with KQL to turn insights into actions.The book gradually shifts focus to operational excellence, helping you develop expertise in investigating alerts, optimizing action accounts, and troubleshooting, which will empower you to master the building and maintenance of a robust ITDR framework and strengthen your security posture.By the end of this book, you'll be able to harness the full potential of MDI's functionalities, positioning you as a key player in your organization's cybersecurity defenses.What You Will Learn: - Ensure a secure and efficient MDI setup for peak defense capabilities- Unlock automation with PowerShell scripting magic- Seamlessly blend MDI with AD CS, AD FS, and Entra Connect- Expand MDI's reach and impact through APIs- Pioneer advanced threat hunting with KQL expertise in Defender XDR- Craft expert, strategic responses to security alerts- Optimize action accounts for maximum agility- Establish a robust and rigid ITDR frameworkWho this book is for: If you're an IT or security professional looking to enhance your cybersecurity skills, especially in identity protection and threat management with Microsoft Defender for Identity (MDI), then this book is for you. It's perfect for system administrators, cybersecurity analysts, and cloud engineers who want to strengthen their expertise in MDI. A basic understanding of cybersecurity principles, as well as familiarity with Microsoft environments and Active Directory are recommended prerequisites for maximizing your learning experience.Table of Contents- Introduction to Microsoft Defender for Identity- Setting up Microsoft Defender for Identity- Leveraging MDI PowerShell for Automation and Management- Integrating MDI with AD FS, AD CS, and Entra Connect- Extending MDI Capabilities Through APIs- Mastering KQL for Advanced Threat Detection in MDI- Investigating and Responding to Security Alerts- Utilizing MDI Action Accounts Effectively- Building a Resilient Identity Threat Detection and Response Framework- Navigating Challenges: MDI Troubleshooting and Optimization

9 特價1904
立即代訂
下次再買

Cyber Investigations of Smart Devices

CRC Press 出版
2024/12/05 出版

The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device ecosystems, the fundamentals of cyber investigations, and the specific security challenges posed by IoT and smart devices.Readers will gain a deep understanding of cyber threats targeting smart devices, including their motivations and tactics. The book also offers practical guidance on implementing robust cyber defence strategies and best practices to protect critical infrastructure. It explores the complexities of cyber attribution, the forensic implications of advanced cyberattacks, and the transformative potential of emerging technologies in shaping the future of digital investigations.With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips cybersecurity professionals, law enforcement agencies, and organizations with the knowledge and tools needed to effectively investigate and mitigate cyber threats in the age of smart devices. Cyber Investigations of Smart Devices is essential reading for anyone involved in cybersecurity, digital forensics, and the protection of critical infrastructure.

9 特價2861
立即代訂
下次再買

Mastering Cybersecurity

CRC Press 出版
2024/12/05 出版

In today's ever-evolving digital landscape, cybersecurity professionals are in high demand. These books equip you with the knowledge and tools to become a master cyberdefender. The handbooks take you through the journey of ten essential aspects of practical learning and mastering cybersecurity aspects in the form of two volumes.Volume 1: The first volume starts with the fundamentals and hands-on of performing log analysis on Windows and Linux systems. You will then build your own virtual environment to hone your penetration testing skills. But defense isn't just about identifying weaknesses; it's about building secure applications from the ground up. The book teaches you how to leverage Docker and other technologies for application deployments and AppSec management. Next, we delve into information gathering of targets as well as vulnerability scanning of vulnerable OS and Apps running on Damm Vulnerable Web Application (DVWA), Metasploitable2, Kioptrix, and others. You'll also learn live hunting for vulnerable devices and systems on the Internet.Volume 2: The journey continues with volume two for mastering advanced techniques for network traffic analysis using Wireshark and other network sniffers. Then, we unlock the power of open-source intelligence (OSINT) to gather valuable intel from publicly available sources, including social media, web, images, and others. From there, explore the unique challenges of securing the internet of things (IoT) and conquer the art of reconnaissance, the crucial first stage of ethical hacking. Finally, we explore the dark web - a hidden corner of the internet - and learn safe exploration tactics to glean valuable intelligence. The book concludes by teaching you how to exploit vulnerabilities ethically during penetration testing and write pen test reports that provide actionable insights for remediation.The two volumes will empower you to become a well-rounded cybersecurity professional, prepared to defend against today's ever-increasing threats.

9 特價6678
立即代訂
下次再買

Performance Parameters and QoS in Cloud Computing

2024/12/04 出版

Cloud computing is an internet-based model that delivers shared resources, software, and data to devices on demand, much like a public utility. It uses remote servers to manage data and applications, allowing users to access files and run software without local installation. This infrastructure outperforms traditional service models by offering reduced upfront costs, scalability, and high fault tolerance. Companies like Google, Amazon, and Microsoft have been quick to adopt cloud systems due to their established dominance.A key challenge in cloud computing is efficient service scheduling. Effective scheduling ensures high Quality of Service (QoS) by managing multiple workflows dynamically. This book provides the common algorithms used in scheduling of tasks which majorly affects the Quality of Service in Cloud Computing.

9 特價1946
立即代訂
下次再買

A Graph Theoretical Approach to Pruning Deep Neural Networks

Grin Verlag 出版
2024/12/04 出版

Bachelor Thesis from the year 2024 in the subject Computer Sciences - Artificial Intelligence, grade: 100/100, Baden-Wuerttemberg Cooperative State University (DHBW) (Economics), course: Business Information Systems - Data Science, language: English, abstract: Large machine learning models, such as language models, have garnered increased attention due to their evolving capabilities. However, their performance gains are accompanied by growing sizes and deployment costs, necessitating effective inference optimization techniques. This thesis proposes MLP-Rank, a novel method utilizing centrality measures from graph theory to prune artificial neural networks, which reduces both computational requirements and the memory footprint of the model. Specifically, we devise a method for creating a weighted directed a cyclical graph representation of multilayer perceptron models, upon which the weighted PageRank centrality measure is applied to compute node importance scores. Subsequently, the model undergoes pruning based on these scores, resulting in structured sparsity patterns in parameter matrices. Furthermore, we introduce a new implementation of weighted PageRank, tailored to the structure of neural network models, facilitating convergence within a single power iteration and ensuring efficient computational complexity for MLP-Rank. We provide theoretical derivations and proofs underpinning the effectiveness of MLP-Rank pruning, along with extensive empirical evaluations comparing it to established baseline methods. MLP-Rank demonstrates superior performance over methods relying on random scores, L1-norm, activations, and structured Wanda in the majority of comparisons. Notably, it achieves the average high-est accuracy retention across all experiments.

9 特價2264
立即代訂
下次再買

AI Product Manager’s Handbook - Second Edition

Packt 出版
2024/12/04 出版

Blending strategic frameworks, real-world case studies, and cutting-edge AI insights, this guide equips product managers with the tools to navigate challenges, drive innovation, and build scalable, high-impact AI products.Key Features: - Gain insights into AI product discovery, market fit, and execution through structured frameworks.- Learn to translate complex AI capabilities into real-world solutions that drive value.- Understand ethical AI, bias mitigation, and compliance to build responsible AI products.- Purchase of the print or Kindle book includes a free PDF eBook.Book Description: AI is rapidly transforming product management, presenting new challenges and business opportunities. As AI-driven solutions become more complex, product managers must bridge the gap between technological capabilities and business needs. This book provides a detailed roadmap for successfully building and maintaining AI-driven products, serving as an indispensable companion on your journey to becoming an effective AI product manager. In this second edition, you'll find fresh insights into generative AI, and responsible AI practices with the most relevant tools for building AI-powered products.Authored by a leading AI product expert with years of hands-on experience in developing and managing AI solutions, this guide translates complex AI concepts into actionable strategies. Whether you're an aspiring AI PM or an experienced professional, this book offers a structured approach to defining AI product vision, leveraging data effectively, and aligning AI with business objectives. With new case studies and refined frameworks, this edition provides deeper insights into ethical AI, cross-functional collaboration, and deployment challenges.By the end of this book, you'll be equipped with the knowledge to drive AI product success with key techniques for identifying AI opportunities and managing risks in a rapidly evolving landscape.What You Will Learn: - Plan your AI PM roadmap and navigate your career with clarity and confidence- Gain a foundational understanding of AI/ML capabilities- Align your product strategy, nurture your team, and navigate the ongoing challenges of cost, tech, compliance, and risk management- Identify pitfalls and green flags for optimal commercialization- Separate hype from reality and identify quick wins for AI enablement and GenAI- Understand how to develop and manage both native and evolving AI products- Benchmark product success from a holistic perspectiveWho this book is for: This book is tailored for aspiring and experienced product managers, AI strategists, and business leaders aiming to integrate AI into their products. A foundational understanding of AI is expected and reinforced throughout the book. It is particularly valuable for professionals looking to bridge AI and business strategy, optimize AI/ML applications, and drive data-informed decision-making. Engineers, designers, and executives seeking to align AI capabilities with user needs and market demands will also benefit from the insights and real-world case studies on building scalable AI products.Table of Contents- Understanding the Infrastructure and Tools for Building AI Products- Model Development and Maintenance for AI Products- Deep Learning Deep Dive- Commercializing AI Products- AI Transformation and Its Impact on Product Management- Understanding the AI-Native Product- Productizing the ML Service- Customization for Verticals, Customers, and Peer Groups- Product Design for the AI-Native Product- Benchmarking Performance, Growth Hacking, and Cost(N.B. Please use the Read Sample option to see further chapters)

9 特價1835
立即代訂
下次再買

AI Engineering

Chip,Huyen  著
O'Reilly Media 出版
2024/12/04 出版

Recent breakthroughs in AI have not only increased demand for AI products, they've also lowered the barriers to entry for those who want to build AI products. The model-as-a-service approach has transformed AI from an esoteric discipline into a powerful development tool that anyone can use. Everyone, including those with minimal or no prior AI experience, can now leverage AI models to build applications. In this book, author Chip Huyen discusses AI engineering: the process of building applications with readily available foundation models. The book starts with an overview of AI engineering, explaining how it differs from traditional ML engineering and discussing the new AI stack. The more AI is used, the more opportunities there are for catastrophic failures, and therefore, the more important evaluation becomes. This book discusses different approaches to evaluating open-ended models, including the rapidly growing AI-as-a-judge approach. AI application developers will discover how to navigate the AI landscape, including models, datasets, evaluation benchmarks, and the seemingly infinite number of use cases and application patterns. You'll learn a framework for developing an AI application, starting with simple techniques and progressing toward more sophisticated methods, and discover how to efficiently deploy these applications. Understand what AI engineering is and how it differs from traditional machine learning engineering Learn the process for developing an AI application, the challenges at each step, and approaches to address them Explore various model adaptation techniques, including prompt engineering, RAG, fine-tuning, agents, and dataset engineering, and understand how and why they work Examine the bottlenecks for latency and cost when serving foundation models and learn how to overcome them Choose the right model, dataset, evaluation benchmarks, and metrics for your needs Chip Huyen works to accelerate data analytics on GPUs at Voltron Data. Previously, she was with Snorkel AI and NVIDIA, founded an AI infrastructure startup, and taught Machine Learning Systems Design at Stanford. She's the author of the book Designing Machine Learning Systems, an Amazon bestseller in AI. AI Engineering builds upon and is complementary to Designing Machine Learning Systems (O'Reilly).

9 特價2520
立即代訂
下次再買

Wordpress Website

Jeffrey Malloy 出版
2024/12/04 出版

This book is addressed to readers who are ready and intend to start creating their own wordpress website.It is assumed that this does not require special technical training, just general knowledge and initial awareness of the nature and composition of the tasks to be solved.First, we are talking about novice bloggers, webmasters, and future website owners who intend to create a website independently or with a little help from professional specialists. Inside this guide, you'll discover: A thorough introduction to wordpress and elementor, including their features and benefitsStep-by-step tutorials for installing and configuring wordpress and elementorDesigning captivating web pages using elementor's intuitive interface and powerful widgetsCustomizing your website's appearance with elementor's style settings and advanced optionsThe difference of this book is that it does not require any prior knowledge in web programming, because wordpress allows anyone to create their own website without the need to know how to program. Wordpress offers simplified methods to create complete websites with management done through a control panel. The book explains step by step how to use these features and how to customize the site according to the preferences of the reader. With no code (but if you want some code, the sky is the limit.

9 特價628
立即代訂
下次再買

Public Key Cryptosystems

Esra,Bas  著
CRC Press 出版
2024/12/04 出版

This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary background, Chapters 1 and 2 are devoted to the selected fundamental concepts in cryptography mathematics and selected fundamental concepts in cryptography.Chapter 3 is devoted to discrete logarithm problem (DLP), DLP-related public key cryptosystems, digital signature algorithms, and their cryptanalysis. In this chapter, the elliptic curve counterparts of the algorithms and the basic algorithms for the solution of DLP are also given. In Chapter 4, RSA public key cryptosystem, RSA digital signature algorithm, the basic cryptanalysis approaches, and the integer factorization methods are provided. Chapter 5 is devoted to GGH and NTRU public key cryptosystems, GGH and NTRU digital signature algorithms, and the basic cryptanalysis approaches, whereas Chapter 6 covers other topics including knapsack cryptosystems, identity-based public key cryptosystems, identity-based digital signature algorithms, Goldwasser-Micali probabilistic public key cryptosystem, and their cryptanalysis.The book's distinctive features: The book provides some fundamental mathematical and conceptual preliminaries required to understand the core parts of the book. The book comprises the selected public key cryptosystems, digital signature algorithms, and the basic cryptanalysis approaches for these cryptosystems and algorithms. The cryptographic algorithms and most of the solutions of the examples are provided in a structured table format to support easy learning. The concepts and algorithms are illustrated with examples, some of which are revisited multiple times to present alternative approaches. The details of the topics covered in the book are intentionally not presented; however, several references are provided at the end of each chapter so that the reader can read those references for more details.

9 特價6678
立即代訂
下次再買

Theory of Cryptography

Elette,Boyle  著
Springer 出版
2024/12/04 出版

The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.

9 特價4769
立即代訂
下次再買

Cyber Investigations of Smart Devices

CRC Press 出版
2024/12/04 出版

The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device ecosystems, the fundamentals of cyber investigations, and the specific security challenges posed by IoT and smart devices.Readers will gain a deep understanding of cyber threats targeting smart devices, including their motivations and tactics. The book also offers practical guidance on implementing robust cyber defence strategies and best practices to protect critical infrastructure. It explores the complexities of cyber attribution, the forensic implications of advanced cyberattacks, and the transformative potential of emerging technologies in shaping the future of digital investigations.With a focus on AI-based cybersecurity opportunities and issues in industrial IoT, this book equips cybersecurity professionals, law enforcement agencies, and organizations with the knowledge and tools needed to effectively investigate and mitigate cyber threats in the age of smart devices. Cyber Investigations of Smart Devices is essential reading for anyone involved in cybersecurity, digital forensics, and the protection of critical infrastructure.

9 特價6678
立即代訂
下次再買

The Dark Side of Networking

2024/12/03 出版

How vulnerable are the connected systems you rely on daily?Are you prepared to defend against the evolving threats of next-gen networks?"Hacking Next-Gen Networks: Cars, Radio, and IoT Explored" by Alex Cypherpunk dives into the critical intersection of cybersecurity and modern technology. As networks increasingly integrate with physical systems, vehicles, and IoT devices, the attack surface expands dramatically. This book provides a comprehensive roadmap to understanding, exploiting, and securing these advanced systems, making it an essential resource for cybersecurity professionals, ethical hackers, and tech enthusiasts alike.Through a mix of technical depth and practical applications, this guide equips readers with the skills to navigate vulnerabilities in next-gen networks, defend critical infrastructure, and stay ahead of the ever-changing threat landscape.Key highlights include: A detailed exploration of the convergence of cyber and physical systems, helping you identify potential vulnerabilities in interconnected environments.Comprehensive insights into hacking connected vehicles, including in-vehicle network architectures and wireless attack vectors, empowering you to secure transportation systems.A thorough understanding of radio frequency systems and protocols, teaching you to protect against RF-based attacks and ensure robust communication security.A practical guide to the IoT ecosystem, from penetration testing to addressing privacy and security challenges, enabling you to safeguard smart devices effectively.Real-world case studies and defensive strategies that prepare you to counteract modern cyber threats with confidence.This book is more than a guide-it's a critical tool for navigating the new frontier of cybersecurity. With limited availability and rising demand, now is the time to secure your copy and stay ahead of the curve.Take action today to enhance your cybersecurity expertise. Order "Hacking Next-Gen Networks: Cars, Radio, and IoT Explored" now and be prepared for the future of network security!

9 特價896
立即代訂
下次再買

The Dark Side of Networking

2024/12/03 出版

How do hackers exploit network vulnerabilities with precision? Are your systems truly secure against the latest cyber threats?"The Dark Side of Networking: Exploiting Vulnerabilities" by Robin Redline offers a dual perspective on network security, blending the advanced techniques hackers use to breach systems with the strategies professionals need to protect them. This book is an essential resource for IT professionals, cybersecurity enthusiasts, and ethical hackers who want to deepen their understanding of network vulnerabilities and defenses.From reconnaissance to post-exploitation, each chapter is packed with actionable insights, real-world examples, and hands-on techniques. The content is designed to empower you with the knowledge needed to both anticipate attacks and build robust countermeasures, ensuring the integrity of your network.Key features and benefits include: Comprehensive analysis of common network vulnerabilities and the cyber kill chain, giving you the knowledge to identify and mitigate risks before they escalate.Step-by-step coverage of reconnaissance techniques, including footprinting, social engineering, and OSINT, helping you understand how attackers gather information.Detailed exploration of exploitation tools and methodologies, from penetration testing to lateral movement, enabling you to fortify your defenses.Practical insights into post-exploitation tactics, such as maintaining persistent access and anti-forensics, ensuring you know how to detect and respond to advanced threats.Advanced strategies for network hardening, incident response, and forensic analysis, equipping you with the tools to safeguard your systems effectively.This is not just a book-it's a comprehensive guide to understanding the dark side of networking and mastering the skills needed to defend against it. With cybersecurity threats evolving daily, having this resource at your fingertips is crucial. However, limited copies are available, so act now to secure your copy before it's too late.Take charge of your network's security. Order "The Dark Side of Networking: Exploiting Vulnerabilities" today and stay ahead of the attackers!

9 特價896
立即代訂
下次再買

Networking Protocols Unleashed

2024/12/03 出版

Are you ready to master the art of networking? Have you ever wondered what sets expert hackers apart in understanding protocols like TCP/IP and DNS?"Networking Protocols Unleashed: In-Depth Analysis for the Seasoned Hacker" is your ultimate guide to diving deep into the complexities of networking protocols. Tailored for seasoned professionals and those eager to elevate their expertise, this book explores the technical nuances of TCP/IP, DNS, and more. Whether you're optimizing network performance or dissecting protocol behavior, this comprehensive resource will transform your knowledge into actionable skills.Inside, you'll uncover advanced topics broken down into clear, practical insights. From the foundational OSI model to the intricacies of DNS record management, every chapter equips you with the tools needed to navigate and master complex networks.Key highlights of this book include: Detailed explanations of the OSI model, TCP/IP stack, and their real-world applications, ensuring a solid foundation for advanced networking.In-depth analysis of TCP mechanisms, including connection establishment, flow control, and congestion optimization, giving you practical tools to enhance network reliability.Comprehensive coverage of IPv4 and IPv6 addressing, NAT, VPNs, and tunneling protocols, empowering you to design and troubleshoot modern network architectures.A deep dive into DNS architecture and query-response mechanisms, helping you understand and manipulate name resolution with precision.Expert insights into advanced techniques for quality of service and protocol performance optimization, maximizing your efficiency in complex scenarios.This isn't just another networking book-it's a must-have resource for professionals ready to take their skills to the next level.With limited availability, now is the perfect time to secure your copy and gain an edge in your field. Don't miss out on this essential addition to your library.Take action today and elevate your networking expertise. Order your copy of "Networking Protocols Unleashed" now!

9 特價928
立即代訂
下次再買

Expert Network Analysis

2024/12/03 出版

Are you ready to unlock the full potential of network analysis tools? Ever wondered how professionals uncover hidden network issues with precision and speed?Expert Network Analysis: Advanced Strategies Using Wireshark and Tcpdump is your ultimate guide to mastering professional-grade network diagnostics. Written by renowned expert Ethan Packetsniffer, this book provides an in-depth exploration of Wireshark and Tcpdump, the industry's most trusted tools. Whether you're a seasoned analyst or a networking enthusiast aiming to level up, this book is packed with actionable insights to sharpen your skills.Through clear explanations, hands-on tutorials, and real-world examples, you'll gain the expertise to analyze network traffic, troubleshoot performance issues, and identify security threats. This resource bridges the gap between theory and practice, making it an essential addition to any network analyst's library.Key features and benefits include: Step-by-step guidance on setting up and configuring Wireshark and Tcpdump, enabling you to start analyzing networks efficiently.Comprehensive coverage of deep packet inspection techniques for dissecting Ethernet, IP, TCP, and UDP headers, ensuring you understand the inner workings of protocols.Insights into analyzing application protocols like HTTP, FTP, DNS, and SMTP, helping you troubleshoot issues faster and with confidence.Advanced strategies for identifying anomalies and mitigating security threats, safeguarding your network against potential breaches.Practical methods for monitoring bandwidth utilization and optimizing network performance, improving reliability and speed.book is not just a guide-it's a professional toolkit designed to elevate your network diagnostic skills. With limited copies available and increasing demand from IT professionals, now is the time to secure your copy.Don't wait to transform your network analysis capabilities. Order Expert Network Analysis: Advanced Strategies Using Wireshark and Tcpdump today and take your expertise to the next level!

9 特價896
立即代訂
下次再買

Generative AI for Financial Services

2024/12/03 出版

DESCRIPTION Generative AI for Financial Services is a book targeted at any AI practitioner who wants to understand how generative AI works on a fundamental level and extend that learning to risks, challenges, and opportunities in regulated industries like financial services. This book explores generative AI and its applications in financial services. It starts by explaining key concepts, differences from traditional AI, and the generative AI lifecycle. Readers learn about foundation models, transfer learning, and implementation strategies, including fine-tuning and training models. Practical use cases like improving customer experiences, automating ESG analysis, and optimizing contact centers are covered. The book also addresses challenges like model bias, ethics, and compliance while focusing on building trustworthy AI with fairness and accountability. Finally, it highlights MLOps and FMOps for efficient AI model deployment and management in production environments.By the end of this book, you will be well-equipped to navigate the exciting world of generative AI and confidently apply its transformative potential within the financial services landscape.KEY FEATURES ● Evolve from a generative AI enthusiast to an advanced practitioner in generative AI.● Learn effective ways of building generative AI solutions for financial services.● Become familiar with the upcoming trends in generative AI space.WHAT YOU WILL LEARN● Learn about popular use-cases, challenges, risks in financial services, and how to overcome those.● Learn how to launch and scale generative AI applications in regulated environments like financial services, expanding from tens to thousands of use cases.● Understand the operational aspects of AI, including MLOps and FMOps.● Address challenges and ethical considerations in AI implementation.WHO THIS BOOK IS FORThis book is suitable for generative AI engineers, prompt engineers, ML engineers, data scientists, AI/ML, and technical leaders in financial services.

9 特價1913
立即代訂
下次再買

Public Key Cryptosystems

Esra,Bas  著
CRC Press 出版
2024/12/03 出版

This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary background, Chapters 1 and 2 are devoted to the selected fundamental concepts in cryptography mathematics and selected fundamental concepts in cryptography.Chapter 3 is devoted to discrete logarithm problem (DLP), DLP-related public key cryptosystems, digital signature algorithms, and their cryptanalysis. In this chapter, the elliptic curve counterparts of the algorithms and the basic algorithms for the solution of DLP are also given. In Chapter 4, RSA public key cryptosystem, RSA digital signature algorithm, the basic cryptanalysis approaches, and the integer factorization methods are provided. Chapter 5 is devoted to GGH and NTRU public key cryptosystems, GGH and NTRU digital signature algorithms, and the basic cryptanalysis approaches, whereas Chapter 6 covers other topics including knapsack cryptosystems, identity-based public key cryptosystems, identity-based digital signature algorithms, Goldwasser-Micali probabilistic public key cryptosystem, and their cryptanalysis.The book's distinctive features: The book provides some fundamental mathematical and conceptual preliminaries required to understand the core parts of the book. The book comprises the selected public key cryptosystems, digital signature algorithms, and the basic cryptanalysis approaches for these cryptosystems and algorithms. The cryptographic algorithms and most of the solutions of the examples are provided in a structured table format to support easy learning. The concepts and algorithms are illustrated with examples, some of which are revisited multiple times to present alternative approaches. The details of the topics covered in the book are intentionally not presented; however, several references are provided at the end of each chapter so that the reader can read those references for more details.

9 特價2861
立即代訂
下次再買

The Genesis of a Techno-Civilization

Gwen,Swan  著
2024/12/02 出版

The Genesis of a Techno-Civilization: An Era ofTransformationThe Genesis of a Techno-Civilization: An Era of Transformation, authored by visionarythinker Gwen Swan, offers a profound exploration of the transformative synergy betweenArtificial General Intelligence (AGI), Artificial Superintelligence (ASI), and blockchain technology.Swan masterfully examines how these revolutionary advancements are reshaping industries, societal norms, and the very essence of global civilization. At the heart of this transformation liesa groundbreaking paradigm-Techno-Civilization-a world where interconnected intelligenceand decentralized trust propel humanity into uncharted realms of progress.Gwen Swan guides readers through the historical evolution and technological milestones of AGIand blockchain, shedding light on their potential to transcend human limitations and encodetrust directly into digital infrastructures. The Genesis of a Techno-Civilization introduces thisvisionary concept as the blueprint for a future where innovation drives profound societal shiftsand unlocks unprecedented possibilities.From precision medicine and decentralized finance to smart cities and sustainable technologies, the book showcases real-world applications that underscore the transformative impact of thesetechnologies. Through insightful analysis and compelling case studies, Swan examines howAGI and blockchain are revolutionizing governance, privacy, identity management, andsustainability. She thoughtfully addresses the ethical dilemmas, societal challenges, and thecritical need for equitable access to the benefits of these technological advancements.Blending bold, future-oriented perspectives with actionable insights, Gwen Swan crafts a guidethat resonates with technologists, entrepreneurs, policymakers, academics, and curious minds.The book equips readers to engage with the complexities of Techno-Civilization while embracingits responsibilities and opportunities.More than just a technical analysis, The Genesis of a Techno-Civilization is Swan's compellingmanifesto for humanity's role in shaping an era defined by innovation, inclusivity, andcollaboration. As we stand at the brink of transformative change, Swan offers a roadmap tonavigate this epoch, fostering an understanding of how to thrive in the dawn of this extraordinaryage. It is an essential companion for anyone seeking to comprehend and influence the future atthe intersection of intelligence and decentralization.

9 特價1827
立即代訂
下次再買

Theory of Cryptography

Elette,Boyle  著
Springer 出版
2024/12/02 出版

The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.

9 特價4292
立即代訂
下次再買

Steganography - The Art of Hiding Information

Joceli,Mayer  著
Intechopen 出版
2024/12/02 出版

This book provides a selection of chapters on the subject of steganography. Steganography is the practice of undetectably altering a digital work to embed a message. The undetectability of the message in the altered work is an essential property of steganography, whereas the required alterations in the work may be perceived as long as the hidden information is undetectable and therefore also undecipherable by non-authorized parties. The design of a steganographic algorithm concerns the properties of the communication medium or channel; the cover work, usually in digital format; and the functions of embedding and decoding the message. As cybersecurity becomes increasingly essential to communications worldwide, hidden or undetectable communication provided by enhanced steganography techniques enables the secure information sharing required by many applications. For business, governmental, or personal sharing of information via communication networks, countermeasures need to be taken to ensure that a third party is unable to detect the existence of a message embedded in the work and to avoid even attempts at decoding the information without the authorization of the sender. The property of undetectability of steganography along with cryptographic techniques has derived secure information schemes in the literature and has been applied in practice. The issues and properties of steganography have been investigated by scientists and practitioners in order to evolve techniques to improve security while sharing information on the open network. This book offers chapters on steganography ranging from definitions to the basics issues and properties, scientific research on diverse techniques, applications for a variety of areas (cybersecurity, military or defense, law enforcement, healthcare, financial services, etc.), and discussions on future applications and current research on the topic.

9 特價5805
立即代訂
下次再買

Theory of Cryptography

Elette,Boyle  著
Springer 出版
2024/12/02 出版

The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.

9 特價7307
立即代訂
下次再買
頁數20/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing