0101~0102_天獄園2
1231~0102_金網寒假動漫節

英文書 > 全部商品

Financial Cryptography and Data Security. FC 2024 International Workshops

Springer 出版
2024/12/01 出版

This book constitutes the proceedings of the workshops that have been held in conjunction with the 28th International Conference on Financial Cryptography, FC 2024, which took place in Willemstad, Cura癟ao, during March 4-8, 2024. The total of 23 papers included in this book stem from the following workshops: 9th Workshop on Advances in Secure Electronic Voting Schemes (Voting 2024), focusing on secure voting protocols, has accepted 5 papers out of 13 submissions; 4th Workshop on Decentralized Finance (DeFI 2024), focusing on decentralized finance and a blockchain powered peer-to-peer financial system, has received 32 submissions and accepted 4 papers for inclusion in this book 8th Workshop on Trusted Smart Contracts (WTSC 2024), dealing with smart contracts and other decentralised applications, accepted 5 papers from 11 submissions; and the 5th Workshop on Coordination of Decentralized Finance (CoDecFin 2024), discussing multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain, has accepted 8 full and 1 short paper from 15 submissions.

9 特價3338
立即代訂
下次再買

Cognitive Computing - ICCC 2024

Ruifeng,Xu  著
Springer 出版
2024/12/01 出版

This book constitutes the refereed proceedings of the 8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024, held in Bangkok, Thailand, during November 16-19, 2024. The 6 full papers and 2 short papers included in this book were carefully reviewed and selected from 10 submissions. They were organized in topical sections as follows: research track; application track; and short paper track.

9 特價2870
貨到通知
下次再買

Cybersecurity

Springer 出版
2024/11/30 出版

This book gives a complete introduction to cybersecurity and its many subdomains. It's unique by covering both technical and governance aspects of cybersecurity and is easy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book's website. The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed. The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance. The digital transformation of society also makes cybersecurity relevant in many other disciplines, hence this book is a useful resource for other disciplines, such as law, business management and political science. Additionally, this book is for anyone in the private or public sector, who wants to acquire or update their knowledge about cybersecurity both from a technological and governance perspective.

9 特價3100
立即代訂
下次再買

Theory of Cryptography

Elette,Boyle  著
Springer 出版
2024/11/30 出版

The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.

9 特價3815
立即代訂
下次再買

Navigating the Soundscape of Deception

Now Publishers 出版
2024/11/28 出版

The rise of audio deepfakes presents a significant security threat that undermines trust in digital communications and media. These synthetic audio technologies can convincingly mimic a person's voice, enabling malicious activities like impersonation, fraud, and misinformation. Addressing this growing threat requires robust detection systems to ensure the authenticity of digital content.In this monograph, a comprehensive analysis of the state-of-the-art techniques in audio deepfake generation and detection is provided. Various methods used to generate audio deepfakes are examined, including Text-to-Speech (TTS) and Voice Conversion (VC) technologies, and their capabilities in producing highly realistic synthetic audio are discussed. On the detection front, a wide range of approaches are explored, encompassing traditional machine learning and deep learning models for feature extraction and classification. The importance of publicly available datasets for training and evaluating these models is emphasized, showcasing their role in advancing detection capabilities. Additionally, the integration of audio and video deepfake detection systems is discussed, providing a comprehensive defense against sophisticated attacks.This monograph critically assesses existing methods and datasets, highlighting challenges like the high realism of deepfakes, limited data diversity, and the need for models that generalize well. It aims to guide future research in enhancing detection and safeguarding digital media integrity.

9 特價4188
立即代訂
下次再買

Natural Language Processing and Knowledge Representation

Mit Press 出版
2024/11/27 出版

The essays in this interdisciplinary book cover a range of implementations and designs, from formal computational models to large-scale NL processing systems.Natural language (NL) refers to human language--complex, irregular, diverse, with all its philosophical problems of meaning and context. Setting a new direction in AI research, this book explores the development of knowledge representation and reasoning (KRR) systems that simulate the role of NL in human information and knowledge processing. Traditionally, KRR systems have incorporated NL as an interface to an expert system or knowledge base that performed tasks separate from NL processing. As this book shows, however, the computational nature of representation and inference in NL makes it the ideal level for all tasks in an intelligent computer system. NL processing combines the qualitative characteristics of human knowledge processing with a computer's quantitative advantages, allowing for in-depth, systematic processing of vast amounts of information. The essays in this interdisciplinary book cover a range of implementations and designs, from formal computational models to large-scale NL processing systems.ContributorsSyed S. Ali, Bonnie J. Dorr, Karen Ehrlich, Robert Givan, Susan M. Haller, Sanda Harabagiu, Chung Hee Hwang, Lucja Iwanska, Kellyn Kruger, Naveen Mata, David A. McAllester, David D. McDonald, Susan W. McRoy, Dan Moldovan, William J. Rapaport, Lenhart Schubert, Stuart C. Shapiro, Clare R. Voss

9 特價3834
立即代訂
下次再買

OpenJS Node.js Application Developer (JSNAD) Certification Guide

Liora,Venith  著
Gitforgits 出版
2024/11/27 出版
9 特價2520
立即代訂
下次再買

Cryptocurrency

2024/11/26 出版
9 特價1023
貨到通知
下次再買

Cybersecurity for Beginners

Caldwell Yatwes 出版
2024/11/26 出版
9 特價945
立即代訂
下次再買

Hacking

Alec,Jensen  著
Alec Jensen 出版
2024/11/26 出版
9 特價819
立即代訂
下次再買

Cybersecurity's Next Frontier

James Harrison 出版
2024/11/26 出版

"Cybersecurity's Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide" is a definitive exploration of the evolving field of cybersecurity, designed to equip readers with a deep understanding of contemporary challenges and proactive defense strategies. This comprehensive guide begins by establishing foundational knowledge, covering essential concepts such as types of cyber threats, threat actors, and common attack vectors like phishing and malware. It then delves into advanced topics, including the impact of emerging technologies such as artificial intelligence (AI), quantum computing, and the Internet of Things (IoT) on cybersecurity practices.The book emphasizes practical insights and actionable recommendations for both individuals and organizations. Readers will learn how to assess and mitigate risks effectively, implement robust cybersecurity measures, and foster a culture of security awareness. Case studies and real-world examples illustrate key concepts, offering valuable insights into cybersecurity incidents and their implications. Additionally, the guide explores global cybersecurity trends, regulatory frameworks, and the evolving threat landscape to provide a holistic view of the challenges and opportunities in securing digital environments."Cybersecurity's Next Frontier" is essential reading for cybersecurity professionals, IT managers, executives, and anyone concerned with protecting sensitive information and infrastructure from cyber threats. By combining comprehensive coverage of foundational principles with cutting-edge insights into emerging technologies, the book equips readers with the knowledge and tools necessary to navigate the complexities of the cyber threat landscape and safeguard against evolving cyber risks effectively.

9 特價630
貨到通知
下次再買

12 Rules for Life According to ChatGPT

Alex,Joonto  著
Alex Joonto 出版
2024/11/26 出版

12 Rules for Life According to ChatGPT: A Wise and Witty Guide to Modern LifeIn this brilliant parody of Jordan Peterson's classic, ChatGPT steps in as the all-knowing, all-joking AI, offering a fresh and funny take on life's most pressing questions. If you've ever wondered whether you should trust a cat with your financial advice or how to gracefully steal the last slice of pizza, this book has the answers-delivered with a generous dose of wit and charm.Each chapter is a delightful mix of practical advice, playful observations, and clever commentary that will have you both laughing out loud and nodding in agreement. With rules like "Always Keep a Spare Pair of Socks" and "Don't Argue with a Barista Before Getting Your Coffee," this book turns everyday dilemmas into opportunities for humor and insight. Whether you're navigating the absurdities of modern life or just looking for a good laugh, 12 Rules for Life According to ChatGPT is your go-to guide for living well-and with a smile.Perfect for fans of self-help, comedy, or anyone who enjoys a good chuckle at life's quirks, this book is both a lighthearted read and a source of genuine wisdom. Get ready to embrace the absurd, find joy in the small things, and consult ChatGPT for all of life's mysteries.

9 特價470
立即代訂
下次再買

AI in Business

2024/11/26 出版

While many companies have already begun their journey towards high automation and AI-powered operations, the landscape continues to shift rapidly. This fully revised and extended new edition explores the ever-evolving landscape of AI in business, towards the autonomous enterprise. Building on the success of the first edition, this book equips corporate decision-makers and IT managers with the knowledge to navigate this dynamic environment, including the latest developments in generative and agentic AI. This book explains the opportunities and risks that the autonomous enterprise presents and how best to navigate the shifting competitive landscape on their journey of change. This book is your guide to AI innovation, presenting key concepts in real world contexts, covering the art of the possible today and providing glimpses into the future of business.

9 特價2193
立即代訂
下次再買

Generative AI on Google Cloud with LangChain

Packt 出版
2024/11/26 出版

Turn challenges into opportunities by learning advanced techniques for text generation, summarization, and question answering using LangChain and Google Cloud toolsKey Features: - Solve real-world business problems with hands-on examples of GenAI applications on Google Cloud- Learn repeatable design patterns for Gen AI on Google Cloud with a focus on architecture and AI ethics- Build and implement GenAI agents and workflows, such as RAG and NL2SQL, using LangChain and Vertex AI- Purchase of the print or Kindle book includes a free PDF eBookBook Description: The rapid transformation and enterprise adoption of GenAI has created an urgent demand for developers to quickly build and deploy AI applications that deliver real value. Written by three distinguished Google AI engineers and LangChain contributors who have shaped Google Cloud's integration with LangChain and implemented AI solutions for Fortune 500 companies, this book bridges the gap between concept and implementation, exploring LangChain and Google Cloud's enterprise-ready tools for scalable AI solutions.You'll start by exploring the fundamentals of large language models (LLMs) and how LangChain simplifies the development of AI workflows by connecting LLMs with external data and services. This book guides you through using essential tools like the Gemini and PaLM 2 APIs, Vertex AI, and Vertex AI Search to create sophisticated, production-ready GenAI applications. You'll also overcome the context limitations of LLMs by mastering advanced techniques like Retrieval-Augmented Generation (RAG) and external memory layers.Through practical patterns and real-world examples, you'll gain everything you need to harness Google Cloud's AI ecosystem, reducing the time to market while ensuring enterprise scalability. You'll have the expertise to build robust GenAI applications that can be tailored to solve real-world business challenges.What You Will Learn: - Build enterprise-ready applications with LangChain and Google Cloud- Navigate and select the right Google Cloud generative AI tools- Apply modern design patterns for generative AI applications- Plan and execute proof-of-concepts for enterprise AI solutions- Gain hands-on experience with LangChain's and Google Cloud's AI products- Implement advanced techniques for text generation and summarization- Leverage Vertex AI Search and other tools for scalable AI solutionsWho this book is for: If you're an application developer or ML engineer eager to dive into GenAI, this book is for you. Whether you're new to LangChain or Google Cloud, you'll learn how to use these tools to build scalable AI solutions. This book is ideal for developers familiar with Python and machine learning basics looking to apply their skills in GenAI. Professionals who want to explore Google Cloud's powerful suite of enterprise-grade GenAI products and their implementation will also find this book useful.Table of Contents: - Using LangChain with Google Cloud- Foundational Models on Google Cloud- Grounding Responses on Google Cloud- Vector Search on Google Cloud- Advanced Techniques for Parsing and Ingesting Documents- Multimodality- Working with Long Context- Building Chatbots- Tools and Function Calling- Agents in Generative AI- Agentic Workflows- Evaluating GenAI Applications- GenAI System Design- Appendix 1 - Overview of Generative AI- Appendix 2 - Google Cloud Foundations

9 特價1904
立即代訂
下次再買

AI 2024: Advances in Artificial Intelligence

Springer 出版
2024/11/25 出版

This two-volume set LNAI 15442-15443 constitutes the refereed proceedings of the 37th Australasian Joint Conference on Artificial Intelligence, AI 2024, held in Melbourne, VIC, Australia, during November 25-29, 2024. The 59 full papers presented together with 3 short papers were carefully reviewed and selected from 108 submissions. Part 1: Knowledge Representation and NLP; Trustworthy and Explainable AI; Machine Learning and Data Mining. Part 2: Reinforcement Learning and Robotics; Learning Algorithms; Computer Vision; AI for Healthcare.

9 特價3577
立即代訂
下次再買

AI 2024: Advances in Artificial Intelligence

Springer 出版
2024/11/25 出版

This two-volume set LNAI 15442-15443 constitutes the refereed proceedings of the 37th Australasian Joint Conference on Artificial Intelligence, AI 2024, held in Melbourne, VIC, Australia, during November 25-29, 2024. The 59 full papers presented together with 3 short papers were carefully reviewed and selected from 108 submissions. Part 1: Knowledge Representation and NLP; Trustworthy and Explainable AI; Machine Learning and Data Mining. Part 2: Reinforcement Learning and Robotics; Learning Algorithms; Computer Vision; AI for Healthcare.

9 特價3815
立即代訂
下次再買

Start Your Podcast Already

Self 出版
2024/11/25 出版

Unlock the Secrets to Podcasting Success!Whether you're an aspiring podcaster or a content creator looking to expand your platform, Start Your Podcast Already is the essential guide for launching and growing your podcast. This book covers everything from planning and recording to marketing and monetization.Who Will Benefit From This Book?Aspiring Podcasters: If you have an idea but don't know where to begin, this guide breaks down the process, helping you navigate the technical and creative steps of podcasting.Beginner Podcasters: Learn how to improve your setup, refine your content, and implement marketing strategies to grow your audience.Content Creators: Add podcasting to your portfolio to reach new audiences and engage with your community.Entrepreneurs & Small Business Owners: Use podcasting for branding and audience engagement.Freelancers & Marketers: Develop podcast production and marketing skills to offer professionally or improve your content strategy.Inside, you'll learn how to: Brainstorm and test podcast concepts that resonate.Define your target audience and create engaging content.Choose the right podcast equipment and master recording techniques.Edit your episodes and polish them for professional quality.Promote your podcast using proven marketing strategies.Monetize your podcast through sponsorships, advertising, and more.No more overthinking-it's time to get your podcast off the ground. Start Your Podcast Already provides the blueprint for your podcasting journey!

9 特價719
立即代訂
下次再買

Cybersecurity Simplified

2024/11/24 出版

In today's interconnected world, no organization or individual is immune to cyber threats. From data breaches to ransomware attacks, the stakes have never been higher. Yet, cybersecurity doesn't have to be overwhelming. In this essential guide, Gary S. Miliefsky, a globally recognized cybersecurity expert, simplifies the complexities of cybersecurity into six manageable pillars: People, Apps, Networking, Computing, Code, and Data (PANCCD(TM)). Whether you're a business leader, IT professional, or just starting your cybersecurity journey, this book equips you with the tools to: Identify and address vulnerabilities within your digital ecosystem.Build resilience against emerging threats with practical, step-by-step strategies.Strengthen compliance with key regulatory frameworks like GDPR and CCPA.Foster a culture of security awareness across your organization.Leverage cutting-edge innovations to stay one step ahead of attackers.Packed with actionable insights, real-world examples, and expert advice, Cybersecurity Simplified demystifies the path to cyber resilience. This book isn't just about protecting your data-it's about securing your future. Gary S. Miliefsky is the creator of the PANCCD(TM) Model, founder of Cyber Defense Magazine, and a trusted voice in the cybersecurity industry. His work bridges the gap between technical complexity and real-world application, empowering organizations worldwide to protect what matters most. Are you ready to take control of your cybersecurity? Grab your copy of Cybersecurity Simplified and start building a stronger, safer digital future today!

9 特價968
立即代訂
下次再買

Cybersecurity Frontiers

2024/11/23 出版

Have you ever wondered how emerging network protocols shape the future of cybersecurity? Are you prepared to tackle the vulnerabilities hidden in the most critical systems today?In Cybersecurity Frontiers: Exploring Advanced Network Protocols, Keiran Calamus offers an authoritative guide to understanding and securing the backbone of modern networks. This comprehensive book dives deep into foundational and advanced protocols, such as DNS, ARP, SMTP, and HTTP/3, and equips readers with the tools to identify, exploit, and mitigate vulnerabilities. Whether you're a network engineer, a cybersecurity student, or an industry professional, this book provides the expertise to navigate the ever-evolving landscape of network security.By breaking down complex concepts into accessible insights, the book empowers readers to master key protocols and their security implications. From the OSI model to IoT protocol advancements, you'll gain practical knowledge to enhance your skills and protect your network environments.Key features and benefits: Learn foundational protocols such as DNS, ARP, and SMTP to understand their architecture and vulnerabilities, helping you strengthen critical network components.Explore the security enhancements in HTTP/2 and HTTP/3, enabling you to stay ahead of cyber threats in next-generation web technologies.Master techniques for mitigating protocol-specific vulnerabilities, such as ARP spoofing, DNS exploits, and SMTP security weaknesses, to safeguard your systems.Discover IoT-focused protocols like MQTT and CoAP, providing insights into securing connected devices in modern infrastructures.Gain real-world applications of encryption and authentication strategies, ensuring robust defenses for your networks.This is not just another book-it's a roadmap to mastering the protocols that power today's digital ecosystems. With limited availability, Cybersecurity Frontiers is a must-have resource for anyone serious about advancing their knowledge in this critical field.Don't wait! Secure your copy of Cybersecurity Frontiers: Exploring Advanced Network Protocols today and start your journey to becoming a network security expert. Your future in cybersecurity starts now!

9 特價896
立即代訂
下次再買

Advanced Network Hacking

2024/11/23 出版

Are you ready to uncover the hidden vulnerabilities in modern networks? Curious about how cyber warfare techniques can be mastered and used to defend against threats?In Advanced Network Hacking: Mastering the Art of Cyber Warfare, Aether Infektion takes you on a compelling journey into the world of advanced cybersecurity. This book delves deep into the tools, techniques, and methodologies used by elite hackers to exploit network vulnerabilities while providing invaluable insights into defending against them. Whether you're an aspiring cybersecurity professional or an experienced expert, this guide equips you with the knowledge to navigate and conquer the ever-evolving digital battlefield.Through its step-by-step approach, you'll explore everything from reconnaissance and vulnerability exploitation to post-exploitation tactics and countermeasures. This is not just a book-it's your comprehensive blueprint for mastering the art of cyber warfare.What you'll gain from this book: Explore advanced reconnaissance techniques to map and analyze networks, empowering you to stay ahead of potential attackers.Learn to identify and exploit network protocol vulnerabilities and wireless network flaws, giving you hands-on expertise in penetration testing.Master the art of web application exploitation, lateral movement, and pivoting, ensuring no system remains a mystery.Dive into zero-day exploits and rootkit development for a deeper understanding of advanced exploitation strategies.Discover proactive defense mechanisms, including incident response, forensic analysis, and cyber threat intelligence, to fortify your network security.This book is more than a technical manual-it's your gateway to becoming a force to be reckoned with in the cybersecurity landscape. With limited copies available, now is the time to invest in your skills and future. Don't let this opportunity slip away. The knowledge contained within these pages could be the key to staying one step ahead of cybercriminals.Take action now! Grab your copy of Advanced Network Hacking today and start mastering the art of cyber warfare. Your journey to becoming an expert begins here.

9 特價896
立即代訂
下次再買

The Hacker's Guide to Industrial Network Security

2024/11/23 出版

Are industrial networks truly secure against today's sophisticated cyber threats? Do you have the expertise to protect SCADA and ICS systems from devastating attacks?In The Hacker's Guide to Industrial Network Security, Sam Switch delivers a comprehensive exploration of the challenges and solutions in securing industrial networks. This book dives into the intricacies of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments, revealing both the vulnerabilities and the cutting-edge strategies to mitigate them. Whether you're an IT professional, a security consultant, or an engineer, this guide equips you with the skills to safeguard critical infrastructures against emerging cyber threats.Through real-world case studies, detailed technical analysis, and actionable defensive strategies, this book bridges the gap between understanding industrial network vulnerabilities and mastering the tools to protect them.Key features and benefits: Learn the fundamentals of SCADA and ICS systems to understand their architecture and how to identify common vulnerabilities, helping you stay prepared for modern threats.Master hacking techniques, including reconnaissance, reverse engineering, and exploiting industrial protocols like Modbus and DNP3, giving you the skills to test and strengthen security measures.Explore case studies of real-world industrial cyberattacks, providing valuable insights into how breaches occur and how to prevent them.Discover effective defensive strategies, such as network segmentation, access control, and secure remote monitoring, to implement robust protection mechanisms.Understand the latest security frameworks and standards, like IEC 62443 and NIST SP 800-82, to align your practices with industry best standards.This book is more than just a guide-it's a critical resource for anyone involved in the security of industrial networks.With cyber threats evolving daily, the knowledge within these pages is indispensable. Limited availability makes this an opportunity you can't afford to miss.Take action now! Secure your copy of The Hacker's Guide to Industrial Network Security today and ensure your expertise keeps pace with the future of industrial cybersecurity.

9 特價896
立即代訂
下次再買

Hacking the Wireless World

2024/11/23 出版

How secure is your wireless network? Are you prepared to exploit vulnerabilities or protect against cyber threats in the wireless domain?In Hacking the Wireless World: Advanced Techniques in Wi-Fi and Bluetooth, Cypher Hawk takes you on an enlightening journey through the complexities of modern wireless networks. This comprehensive guide blends theoretical knowledge with practical applications, equipping you with the tools to both exploit and secure Wi-Fi and Bluetooth technologies. Whether you're a cybersecurity professional, an ethical hacker, or an enthusiast, this book provides invaluable insights into wireless reconnaissance, exploitation, and defense.From understanding the importance of wireless security to mastering the latest attack and protection methods, this book bridges the gap between beginner concepts and advanced techniques. You'll delve into scanning, penetration testing, and defense strategies to confidently navigate the wireless cybersecurity landscape.Key features and benefits: Explore wireless reconnaissance techniques, both passive and active, to map networks and uncover vulnerabilities, helping you stay a step ahead.Master Wi-Fi hacking, including cracking WEP, WPA, and WPA2 encryptions, to gain real-world penetration testing skills.Dive into Bluetooth exploitation methods, from profiling devices to executing advanced BLE attacks, ensuring you're prepared for emerging threats.Learn robust defense mechanisms such as encryption, segmentation, and intrusion prevention to safeguard your networks effectively.Gain a comprehensive understanding of ethical and legal considerations, empowering you to act responsibly in the cybersecurity domain.With limited availability, Hacking the Wireless World is your chance to become proficient in wireless hacking and defense. The knowledge inside this book is in high demand, and waiting could mean missing out on critical insights for your career or projects.Don't wait! Secure your copy of Hacking the Wireless World: Advanced Techniques in Wi-Fi and Bluetooth today and take the first step toward mastering the wireless cybersecurity frontier.

9 特價896
立即代訂
下次再買

Programming APIs with C# and .NET

Packt 出版
2024/11/22 出版

Master API design and deployment with C# and .NET, creating scalable, secure, and high-performance APIs for real-world applicationsKey Features: - Learn API design principles and architecture for high-performance applications- Develop robust APIs using best practices for security, scalability, and maintainability- Implement both traditional and minimal APIs with real-world scenarios- Purchase of the print or Kindle book includes a free PDF eBookBook Description: APIs are at the heart of modern software development, enabling seamless communication between applications. In the C# and .NET ecosystem, mastering API development is key to building scalable, reliable systems that meet both client and enterprise needs.Written by C# and .NET experts Jesse Liberty and Joseph Dluzen, this book draws on their extensive experience as hands-on programmers to equip you with the tools, techniques, and best practices for creating powerful APIs.Starting with API fundamentals, it covers everything you need to design, build, and consume APIs using .NET technologies such as ASP.NET Core, and explores both controller and Function API implementations. You'll integrate essential tools such as Postman for testing to streamline your development workflow.Through practical examples and exercises, the book guides you from database creation to deploying APIs on Azure. By the end of this book, you'll have gained real-world skills to develop secure, high-performance APIs that scale with your applications for both personal projects and enterprise-level systems.What You Will Learn: - Understand core API concepts and how to apply them in .NET projects- Design RESTful APIs with a focus on scalability- Build APIs with ASP.NET Core- Explore alternative options for API development using Azure Functions, including stateful workflows with Durable Functions- Integrate databases into API projects, ensuring efficient data flow- Implement security measures such as authentication and authorization- Deploy APIs to Azure and learn the essentials of cloud integrationWho this book is for: This book is for .NET developers, software engineers, and backend developers looking to master API development using C# and ASP.NET Core. It caters to those with a basic understanding of C# and familiarity with the .NET ecosystem. Even though no prior experience with API frameworks is required, knowledge of ASP.NET Core will be helpful.Table of Contents- Getting Started- What We'll Build- Implementing with REST- Documentation with Swagger - Data Validation - Azure Functions- Azure Durable Functions - Advanced Topics- Authentication and Authorization- Deploying to Azure- What's Next?

9 特價1904
立即代訂
下次再買

Drupal Web Profiles

2024/11/21 出版

This book demystifies Drupal, one of the most popular content management systems in use today. With step-by-step instruction and worked examples, this is a crucial guide to the next level in content management. This project-based guide offers a complete introduction to installation, configuration, and administration; web analytics; optimization through automatic throttling, bandwidth optimization, and page caching; as well as customization to facilitate the creation, installation, and debugging of modules.

9 特價2144
立即代訂
下次再買

Dynamical Behaviors of Multiweighted Complex Network Systems

2024/11/21 出版

Highly comprehensive resource for studying neural networks, complex networks, synchronization, passivity, and associated applications Dynamical Behaviors of Multiweighted Complex Network Systems discusses the dynamical behaviors of various multiweighted complex dynamical networks, with detailed insight on synchronization for directed and undirected complex networks (CNs) with multiple state or delayed state couplings subject to recoverable attacks, along with passivity and synchronization for coupled neural networks with multi-weights (CNNMWs) by virtue of devised proportional-integral-derivative (PID) controllers. The book also investigates finite-time synchronization (FTS) and H-infinity synchronization for two types of coupled neural networks (CNNs) and focuses on finite-time passivity (FTP) and finite-time synchronization (FTS) for complex dynamical networks with multiple state/derivative couplings based on the proportional-derivative (PD) control method. Final chapters consider finite-time output synchronization and H-infinity output synchronization problems, and multiple weighted coupled reaction-diffusion neural networks (CRDNNs) with and without coupling delays. Other topics covered in Dynamical Behaviors of Multiweighted Complex Network Systems include: Criteria of FTP for complex dynamical networks with multiple state couplings (CDNMSCs), formulated by utilizing the PD controller Finite-time passivity (FTP) concepts for the spatially and temporally systems with different dimensions of output and input FTS and finite time H-infinity synchronization problems for CDNs with multiple state/derivative couplings by utilizing state feedback control approach and selecting suitable parameter adjustment schemes Adaptive output synchronization and output synchronization of CDNs with multiple output or output derivative couplings, and other adaptive control schemesEnabling readers to understand foundational concepts and grasp the latest research, Dynamical Behaviors of Multiweighted Complex Network Systems is essential for all who study neural networks, complex networks, synchronization, passivity, and their applications.

9 特價5288
立即代訂
下次再買

Enterprise Architecture with Sap: Planning, Management, and Transformation

Anup,Das  著
SAP Press 出版
2024/11/21 出版

Calling all SAP enterprise architects--the strategy guide you need is here! See how the SAP EA Framework and SAP LeanIX support your enterprise architecture with methodology, reference content, tools, and services. Explore examples of architecture design pattern implementation for real-world use cases, including business model transformation, TCO reduction, sustainability, and more. Follow SAP's blueprint to set up your own enterprise architecture practice. Get best practices, expert tips, full-color architecture diagrams, and more! In this book, you'll learn about: a. FundamentalsLearn the basics of enterprise architecture within SAP landscapes. Walk through SAP EA Framework and understand its integration with ancillary business functions such as process, portfolio, and application management. b. Use Cases See enterprise architecture transformation at work! Practical use cases showcase how architecture patterns can be used to solve design problems in various business scenarios: cloud transformation, sustainability, automation, and more. c. Implementation Launch your own enterprise architecture transformation. Following guidance from the experts, create or improve your practice by setting up roles, processes, and deliverables. Use tools such as SAP LeanIX and SAP Signavio to support your transformation. Highlights include: 1) SAP EA Framework2) SAP EA Methodology 3) SAP EA Designer4) SAP LeanIX5) Business function integration6) Reference content7) Enterprise architecture practices8) Cloud transformation9) Business process transformation10) Sustainability11) Mergers, acquisitions, and divestures

9 特價2833
貨到通知
下次再買

Ransomware Evolution

CRC Press 出版
2024/11/21 出版

Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they have stored. Typically, victims are required to pay a ransom, usually using cryptocurrency, such as Bitcoin, to regain access. Ransomware attacks pose a significant threat to national security, and there has been a substantial increase in such attacks in the post-Covid era. In response to these threats, large enterprises have begun implementing better cybersecurity practices, such as deploying data loss prevention mechanisms and improving backup strategies. However, cybercriminals have developed a hybrid variant called Ransomware 2.0. In this variation, sensitive data is stolen before being encrypted, allowing cybercriminals to publicly release the information if the ransom is not paid. Cybercriminals also take advantage of cryptocurrency's anonymity and untraceability.Ransomware 3.0 is an emerging threat in which cybercriminals target critical infrastructures and tamper with the data stored on computing devices. Unlike in traditional ransomware attacks, cybercriminals are more interested in the actual data on the victims' devices, particularly from critical enterprises such as government, healthcare, education, defense, and utility providers. State-based cyber actors are more interested in disrupting critical infrastructures rather than seeking financial benefits via cryptocurrency. Additionally, these sophisticated cyber actors are also interested in obtaining trade secrets and gathering confidential information. It is worth noting that the misinformation caused by ransomware attacks can severely impact critical infrastructures and can serve as a primary weapon in information warfare in today's age. In recent events, Russia's invasion of Ukraine led to several countries retaliating against Russia. A ransomware group threatened cyber-attacks on the critical infrastructure of these countries. Experts warned that this could be the most widespread ransomware gang globally and is linked to a trend of Russian hackers supporting the Kremlin's ideology.Ensuring cyber safety from ransomware attacks has become a national security priority for many nations across the world. The evolving variants of ransomware attacks present a wider and more challenging threat landscape, highlighting the need for collaborative work throughout the entire cyber ecosystem value chain. In response to this evolving threat, a book addressing the challenges associated with ransomware is very timely. This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of knowledge on the topic.

9 特價6678
立即代訂
下次再買

Web Application PenTesting

2024/11/21 出版

This is an essential resource for navigating the complex, high-stakes world of cybersecurity. It bridges the gap between foundational cybersecurity knowledge and its practical application in web application security. Designed for professionals who may lack formal training in cybersecurity or those seeking to update their skills, this book offers a crucial toolkit for defending against the rising tide of cyber threats.As web applications become central to our digital lives, understanding and countering web-based threats is imperative for IT professionals across various sectors. This book provides a structured learning path from basic security principles to advanced penetration testing techniques, tailored for both new and experienced cybersecurity practitioners. Explore the architecture of web applications and the common vulnerabilities as identified by industry leaders like OWASP. Gain practical skills in information gathering, vulnerability assessment, and the exploitation of security gaps. Master advanced tools such as Burp Suite and learn the intricacies of various attack strategies through real-world case studies. Dive into the integration of security practices into development processes with a detailed look at DevSecOps and secure coding practices. "Web Application PenTesting" is more than a technical manual--it is a guide designed to equip its readers with the analytical skills and knowledge to make informed security decisions, ensuring robust protection for digital assets in the face of evolving cyber threats. Whether you are an engineer, project manager, or technical leader, this book will empower you to fortify your web applications and contribute effectively to your organization's cybersecurity efforts.

9 特價6678
立即代訂
下次再買

Artificial Intelligence for Blockchain and Cybersecurity Powered IoT Applications

CRC Press 出版
2024/11/20 出版

The objective of this book is to showcase recent solutions and discuss the opportunities that AI, blockchain, and even their combinations can present to solve the issue of Internet of Things (IoT) security. It delves into cuttingedge technologies and methodologies, illustrating how these innovations can fortify IoT ecosystems against security threats. The discussion includes a comprehensive analysis of AI techniques such as machine learning and deep learning, which can detect and respond to security breaches in real time. The role of blockchain in ensuring data integrity, transparency, and tamper- proof transactions is also thoroughly examined. Furthermore, this book will present solutions that will help analyze complex patterns in user data and ultimately improve productivity.

9 特價6678
立即代訂
下次再買

Protecting Location Privacy in the Era of Big Data

Yan,Yan  著
CRC Press 出版
2024/11/20 出版

This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.The growth of the mobile Internet and the popularity of smart devices have spurred the development of LBS and related mobile applications. However, the misuse of sensitive location data could compromise the physical and communication security of associated devices and nodes, potentially leading to privacy breaches. This book explores the potential risks to the location privacy of mobile users in the context of big data applications. It discusses the latest methods and implications of location privacy from different perspectives. The author offers case studies of three applications: statistical disclosure and privacy protection of location-based big data using a centralized differential privacy model; a user location perturbation mechanism based on a localized differential privacy model; and terminal location perturbation using a geo-indistinguishability model. Linking recent developments in three-dimensional positioning and artificial intelligence, the book also predicts future trends and provides insights into research issues in location privacy.This title will be a valuable resource for researchers, students, and professionals interested in location-based services, privacy computing and protection, wireless network security, and big data security.

9 特價3815
立即代訂
下次再買

The Institutional Development of Podcasting

Aske,Kammer  著
Routledge 出版
2024/11/20 出版

Referring back to the early 2000s, this book traces the development of podcasting from a "do-it-yourself" medium by amateurs into its current environment, where a wide variety of individuals, organizations, and platforms operate in an increasingly crowded and competitive market.Through original case studies of shows and platforms including "The Daily" and Spotify, the authors explore the processes and effects of commercialization, platformization, and datafication in the industry. Drawing on institutional theory and the growing body of scholarly literature about podcasting, they examine the shifts and reorientations in institutional logics that characterize podcasting and present the different types of actors that operate in the commercial and noncommercial podcast markets.The Institutional Development of Podcasting will be of interest to advanced students and researchers of audio media, journalism, and media industries.

9 特價3195
立即代訂
下次再買

Pricai 2024: Trends in Artificial Intelligence

Rafik,Hadfi  著
Springer 出版
2024/11/19 出版

The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024, held in Kyoto, Japan, in November 18-24, 2024. The 145 full papers and 35 short papers included in this book were carefully reviewed and selected from 543 submissions. The papers are organized in the following topical sections: Part I: Machine Learning, Deep Learning Part II: Deep Learning, Federated Learning, Generative AI, Natural Language Processing, Large Language Models, Part III: Large Language Models, Computer Vision Part IV: Computer Vision, Autonomous Driving, Agents and Multiagent Systems, Knowledge Graphs, Speech Processing, Optimization Part V: Optimization, General Applications, Medical Applications, Theoretical Foundations of AI

9 特價3815
立即代訂
下次再買

Pricai 2024: Trends in Artificial Intelligence

Rafik,Hadfi  著
Springer 出版
2024/11/18 出版

The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024, held in Kyoto, Japan, in November 18-24, 2024. The 145 full papers and 35 short papers included in this book were carefully reviewed and selected from 543 submissions. The papers are organized in the following topical sections: Part I: Machine Learning, Deep Learning Part II: Deep Learning, Federated Learning, Generative AI, Natural Language Processing, Large Language Models, Part III: Large Language Models, Computer Vision Part IV: Computer Vision, Autonomous Driving, Agents and Multiagent Systems, Knowledge Graphs, Speech Processing, Optimization Part V: Optimization, General Applications, Medical Applications, Theoretical Foundations of AI

9 特價3392
貨到通知
下次再買

Pricai 2024: Trends in Artificial Intelligence

Rafik,Hadfi  著
Springer 出版
2024/11/18 出版

The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024, held in Kyoto, Japan, in November 18-24, 2024. The 145 full papers and 35 short papers included in this book were carefully reviewed and selected from 543 submissions. The papers are organized in the following topical sections: Part I: Machine Learning, Deep Learning Part II: Deep Learning, Federated Learning, Generative AI, Natural Language Processing, Large Language Models, Part III: Large Language Models, Computer Vision Part IV: Computer Vision, Autonomous Driving, Agents and Multiagent Systems, Knowledge Graphs, Speech Processing, Optimization Part V: Optimization, General Applications, Medical Applications, Theoretical Foundations of AI

9 特價3815
立即代訂
下次再買

Pricai 2024: Trends in Artificial Intelligence

Rafik,Hadfi  著
Springer 出版
2024/11/18 出版

The five-volume proceedings set LNAI 15281-15285, constitutes the refereed proceedings of the 21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024, held in Kyoto, Japan, in November 18-24, 2024. The 145 full papers and 35 short papers included in this book were carefully reviewed and selected from 543 submissions. The papers are organized in the following topical sections: Part I: Machine Learning, Deep Learning Part II: Deep Learning, Federated Learning, Generative AI, Natural Language Processing, Large Language Models, Part III: Large Language Models, Computer Vision Part IV: Computer Vision, Autonomous Driving, Agents and Multiagent Systems, Knowledge Graphs, Speech Processing, Optimization Part V: Optimization, General Applications, Medical Applications, Theoretical Foundations of AI

9 特價3815
立即代訂
下次再買

Fluent in AI

Hmdpublishing 出版
2024/11/18 出版

Master the human-AI partnership-and then teach students to do the same.In Fluent in AI, Aaron S. Langenauer, an experienced teacher and instructional technology coach, introduces a paradigm shift in education's approach to artificial intelligence: treating it not merely as a tool, but as an intellectual partner. This book shows you how to collaborate with AI to enhance critical thinking, foster creativity, and achieve outcomes beyond what either humans or AI could accomplish alone-all so that you can teach students the skills needed to thrive in an AI-enhanced world.Fluent in AI guides you through: The art and science of prompt engineering, so you can elicit high-quality outputs from AIA curriculum guide for courses on AI and prompt engineeringA step-by-step playbook for integrating AI into the existing educational infrastructureCultivating the prerequisite skills and mindsets students need to partner with AI successfullyLangenauer draws on his extensive background in education technology and curriculum development to provide a practical roadmap for educators. By showcasing AI interactions in various scenarios, this book explores the vast potential of human-AI collaboration in learning environments.As the demand for AI-savvy education surges, Fluent in AI offers the insights and strategies you need to lead the charge. Whether you're a teacher introducing AI concepts or an administrator shaping your school's approach to this new technology, this book is your essential guide to the key skills of the AI era.Equip yourself and your students with the knowledge needed for the new world. The AI revolution in education is here-are you ready to become fluent in AI?

9 特價410
立即代訂
下次再買

Web Services - Icws 2024

Yuchao,Zhang  著
Springer 出版
2024/11/16 出版

This book constitutes the proceedings of the 31st International Conference on Web Services - ICWS 2024, held as Part of the Services Conference Federation, SCF 2024, in Bangkok, Thailand, during November 16-19, 2024. The 9 full papers presented in this volume were carefully reviewed and selected from 16 submissions. The papers cover topics in the field of Web engineering innovations to scientific research for the whole services industry. Service delivery platforms have been expanded to mobile platforms, Internet of Things, cloud computing, and edge computing.

9 特價2623
立即代訂
下次再買

Edge Computing - Edge 2024

Jing,Zeng  著
Springer 出版
2024/11/15 出版

This book constitutes the refereed proceedings of the 8th International Conference on Edge Computing, EDGE 2024, held in Bangkok, Thailand, during November 16-19, 2024. The 8 full papers included in this book were carefully reviewed and selected from 16 submissions. The papers presented focus on various topics such as Edge Storage, Edge Connections, Edge Analytics, Edge AI, Edge Processing Engine, Industry-Specific Edges, Edge Application Innovations, 5G and Edge, 5G and Cloud, AIGC for Edge.

9 特價2623
立即代訂
下次再買

Mastering Serverless Computing with AWS Lambda

2024/11/15 出版

Design and Build Scalable Solutions on the AWS Serverless Ecosystem. Book DescriptionAWS Lambda, a key component of AWS Serverless Computing, has transformed application development by allowing developers to focus on code rather than infrastructure. [Mastering Serverless Computing with AWS Lambda] is a must-have guide for leveraging AWS Lambda to build efficient, cost-effective serverless cloud solutions. This book guides readers from serverless basics to advanced deployment, offering practical approaches to building resilient, scalable applications. Beginning with an introduction to serverless computing, the book explores AWS Lambda fundamentals, covering invocation models, service integrations, and event-driven design. Practical insights into hyper-scaling, instrumentation, and designing for failure empower readers to create robust, production-ready solutions. This guide covers core concepts of serverless computing, including optimizations, automation, and strategies to navigate potential pitfalls. It emphasizes AWS Lambda's resiliency, scalability, and disaster recovery, using real-world examples to showcase best practices. Each chapter offers in-depth examples, edge computing scenarios, and proven patterns to help readers develop optimized serverless architectures. By the end, readers will gain a comprehensive understanding of AWS Lambda, equipping them to design sophisticated systems that meet modern cloud demands and drive innovation within their organizations. Table of Contents1. Introduction to Serverless Computing2. AWS Lambda Basics3. Invocation Models and Service Integrations4. Event-Driven Design with Lambda5. Hyper-Scaling with Lambda6. Instrumenting Lambda7. Resiliency and Design for Failure8. Lambda-Less Design9. Edge Computing10. Patterns and Practices Index

9 特價1902
立即代訂
下次再買

Blockchain - Icbc 2024

Jun,Feng  著
Springer 出版
2024/11/15 出版

This book constitutes the proceedings of the 7th International Conference on Blockchain - ICBC 2024, held as part of the Services Conference Federation, SCF 2024, held in Bangkok, Thailand, during November 16-19, 2024. The 9 full papers included in this book were carefully reviewed and selected from 20 submissions. These papers discussed the latest fundamental advances in the state-of-the-art technologies and best practices of blockchain, as well as emerging standards and research topics which would define the future of blockchain.

9 特價2623
立即代訂
下次再買

Digital Transformation

2024/11/15 出版

Faced with the transformations taking place in today's environment (fierce competition, technological evolution, robotization, globalization... etc), no one can deny that "Digital Transformation" represents an unavoidable and indisputable lever for optimizing the Management and integral Development of any company concerned with preserving its survival.This Ma簾trise de Recherche en Communication Num矇rique (Master's thesis in Digital Communication Research) proposes effective innovation strategies which, individually or collectively, will make both the Institut Sup矇rieur de Gestion and its agents more competent, and subsequently integrate innovation into all sectors of activity, principally those of Education, Research and Administration.Innovation is a process that cannot be ordered, but rather managed. Innovation is a process that can't be controlled, but rather managed. Digital transformation brings with it new skills and upheavals, including for ISG-Kin managers in all sectors, who are faced with new challenges.

9 特價3596
立即代訂
下次再買

Search Methods in Artificial Intelligence

2024/11/14 出版

This book is designed to provide in-depth knowledge on how search plays a fundamental role in problem solving. Meant for undergraduate and graduate students pursuing courses in computer science and artificial intelligence, it covers a wide spectrum of search methods. Readers will be able to begin with simple approaches and gradually progress to more complex algorithms applied to a variety of problems. It demonstrates that search is all pervasive in artificial intelligence and equips the reader with the relevant skills. The text starts with an introduction to intelligent agents and search spaces. Basic search algorithms like depth first search and breadth first search are the starting points. Then, it proceeds to discuss heuristic search algorithms, stochastic local search, algorithm A*, and problem decomposition. It also examines how search is used in playing board games, deduction in logic and automated planning. The book concludes with a coverage on constraint satisfaction.

9 特價3600
立即代訂
下次再買

Statistics with Rust, Second Edition

Gitforgits 出版
2024/11/14 出版

"Statistics with Rust, Second Edition" is designed to help you learn quickly, focusing on practical statistics using Rust scripts. The book is for readers who know the basics of statistics and machine learning. It gives quick explanations so you can try out concepts with hands-on coding. The book uses the newest version of Rust, 1.72.0, to help users build and secure statistical and machine learning algorithms. Each chapter is full of useful programs and code examples that will walk you through tasks like data manipulation, statistical tests, regression analysis, building machine learning models, and natural language processing.We've covered great Rust crates featured throughout, including: ndarray and ndarray-linalg: For efficient handling of multi-dimensional arrays and linear algebra operations.ndarray-stats: To perform statistical computations on arrays.rand and rand_distr: For generating random numbers and working with probability distributions.smartcore: A machine learning library used for implementing algorithms like decision trees and random forests.linfa: A toolkit providing implementations of Support Vector Machines and other algorithms.tch: Rust bindings for PyTorch, enabling the creation and training of neural networks.finalfusion: For working with word embeddings in natural language processing tasks.rust-stemmers: To perform stemming in text preprocessing.regex: For pattern matching and text manipulation.unicode-segmentation: To accurately tokenize Unicode strings.This second edition brings all chapters up to date with the latest in stats and Rust programming. It focuses on how you can put these things to practical use, with a detailed look at advanced algorithms like PCA, SVM, neural networks, and ensemble methods. We've also included some natural language processing topics, such as text preprocessing, tokenization, and word embeddings. The book also shows you how to combine Rust's performance and safety with statistical analysis, giving you the tools you need to do data analysis efficiently and reliably. The book's got lots of practical code and explanations that are easy to understand, which helps you learn the skills you need to get to grips with data using Rust.Table of ContentIntroduction to Rust for StatisticiansData Handling and PreprocessingDescriptive StatisticsProbability Distributions and Random VariablesInferential StatisticsRegression AnalysisBayesian StatisticsMultivariate Statistical MethodsNonlinear Models and Machine LearningModel Evaluation and ValidationText and Natural Language Processing

9 特價2205
立即代訂
下次再買

From Street-smart to Web-wise(R)

Al,Marcella  著
CRC Press 出版
2024/11/13 出版

Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The critical job of ensuring our children's safety expands as students become more independent and begin to have greater online autonomy. From Street-smart to Web-wise(R) A Cyber Safety Training Manual Built for Teachers and Designed for Children isn't just another book -- it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.Written by authors who are recognized experts in their respective fields, this accessible manual is a timely resource for educators. Dive into engaging content that illuminates the importance of cyber safety, not only in our classrooms but extending into the global community.Each chapter is filled with practical examples, stimulating discussion points, and ready-to-use lesson plans tailored for students in third and fourth grades. Regardless of your technology skill level, this book will provide you with the guidance and the tools you need to make student cyber-safety awareness practical, fun, and impactful.As parents partner with educators to create cyber-secure spaces, this book stands as a framework of commitment to that partnership. It's a testament to taking proactive steps in equipping our young learners with the awareness and skills they need to tread the digital world securely.By choosing From Street-smart to Web-wise(R) A Cyber Safety Training Manual Built for Teachers and Designed for Children, you position yourself at the forefront of educational guardianship, championing a future where our children can explore, learn, and grow online without fear. Join us on this journey to empower the next generation -- one click at a time!

9 特價2861
立即代訂
下次再買

Human Vs ChatGPT - Language of Advertising in Beauty Products Advertisements

Ida,Skubis  著
CRC Press 出版
2024/11/13 出版

This book systematically investigates the linguistic strategies employed in beauty product advertising to assess their persuasive and manipulative effects. The work is divided into two sections: a review of relevant literature and an empirical analysis of advertisements. The analysis initially focuses on the linguistic features of advertisements created by humans prior to the introduction of ChatGPT, examining the linguistic measures used and their methods of persuasion and manipulation. Subsequent sections provide a detailed examination of advertisements generated by ChatGPT versions 3.5 and 4.0, analysing the artificial intelligence's use of linguistic techniques. This includes a meta-analysis where ChatGPT itself discusses the linguistic strategies it employs. The ultimate goal is to compare and contrast the effectiveness and linguistic devices used in advertisements crafted by humans and those by ChatGPT, analysing how AI influences the language of advertising and its impact on consumer behaviour.

9 特價3100
立即代訂
下次再買

GraphQL Best Practices

Packt 出版
2024/11/13 出版

Get to grips with best practices, advanced techniques, and practical examples in TypeScript for building a scalable and secure backend with seamless frontend integrationKey Features: - Gain detailed guidance for crafting effective GraphQL schemas- Explore insights into securing and optimizing GraphQL applications- Learn through step-by-step examples, using TypeScript for practical learning- Purchase of the print or Kindle book includes a free PDF eBookBook Description: In the ever-evolving landscape of web development, GraphQL has emerged as a powerful query language that addresses the limitations of traditional REST APIs. This guide delves deep into GraphQL, starting with its foundational principles and swiftly advancing to complex topics that will equip you with the skills you need to understand this technology.As you progress, you'll cover advanced concepts such as schema design, security enhancements, and error handling. You'll also explore essential topics such as federation and the transition from REST to GraphQL, gaining a comprehensive understanding of these critical areas. The book helps you learn through practical examples in TypeScript, guiding you through building scalable and secure GraphQL backends. Additionally, you'll get up to speed with the intricacies of frontend integration.By the end of this book, you'll have the skills you need to implement real-world GraphQL solutions, creating efficient and robust applications that meet modern web development demands.What You Will Learn: - Understand the core principles of GraphQL- Integrate GraphQL with frontend technologies such as Node.js and Next.js- Optimize GraphQL queries for better performance- Deploy and maintain GraphQL applications with confidence- Explore schema design, security, and error handling- Scale GraphQL with modular schemasWho this book is for: This book is for developers interested in advancing their knowledge of GraphQL, from beginners curious about the basics to experienced developers looking to refine their schema design and security strategies. It's particularly ideal for backend developers, full-stack professionals, and frontend developers who wish to understand GraphQL from the ground up and apply advanced techniques in real-world scenarios. Additionally, this book is a must-read for anyone looking to make their applications more efficient and robust using GraphQL.Table of Contents- Unveiling the Holy Grail of Communication - GraphQL- Applying an AI-Friendly Approach to GraphQL - Crafting Effective GraphQL Schemas - Building Pipes- Transitioning from REST to GraphQL- Defining GraphQL Transformers- Understanding GraphQL Federation- Executing Schema-First Systems- Working on the Frontend with GraphQL- Keeping Data Secure - Describing Errors in GraphQL- Documenting your Schema- Tackling Schemas with Visualization- From an Idea to a Working Project - Backend Development with GraphQL and TypeScript- From an Idea to a Working Project - Frontend Integration with GraphQL and TypeScript

9 特價1692
立即代訂
下次再買

Cyber Election Meddling

Faton,Aliu  著
Booklocker.com 出版
2024/11/13 出版

Cyber Election Meddling: The Impact on Voter Beliefs and Decisions explores the rise of cyber-influence campaigns that have shaped modern elections. Beginning with the 2016 U.S. presidential election, Russian state-sponsored organizations systematically deployed misinformation across social media and news outlets. This unprecedented effort undermined public trust in candidates and the electoral process, reshaping how voters perceived key issues and made decisions at the ballot box.This study takes a quantitative, non-experimental approach to examine the relationship between voters' belief in foreign election meddling and how it influences their decision-making process. Using the social cognitive theory as its framework, the research highlights the role of information sources in shaping voter perceptions, finding that those who relied on traditional news media rather than blogs or social media were more likely to recognize interference efforts.The findings of this research are compelling: awareness of cyber-meddling doesn't necessarily reduce its impact on voters. Better-educated individuals were likelier to detect these disinformation campaigns, yet their decision-making process remained susceptible. Cyber Election Meddling offers a timely, critical examination of how foreign influence operations affect democratic outcomes and public trust, with implications far beyond a single election.

9 特價710
立即代訂
下次再買

From Street-smart to Web-wise(R)

Al,Marcella  著
CRC Press 出版
2024/11/13 出版

Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The critical job of ensuring our children's safety expands as students become more independent and begin to have greater online autonomy. From Street-smart to Web-wise(R) A Cyber Safety Training Manual Built for Teachers and Designed for Children isn't just another book -- it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.Written by authors who are recognized experts in their respective fields, this accessible manual is a timely resource for educators. Dive into engaging content that illuminates the importance of cyber safety, not only in our classrooms but extending into the global community.Each chapter is filled with practical examples, stimulating discussion points, and ready-to-use lesson plans tailored for students in third and fourth grades. Regardless of your technology skill level, this book will provide you with the guidance and the tools you need to make student cyber-safety awareness practical, fun, and impactful.As parents partner with educators to create cyber-secure spaces, this book stands as a framework of commitment to that partnership. It's a testament to taking proactive steps in equipping our young learners with the awareness and skills they need to tread the digital world securely.By choosing From Street-smart to Web-wise(R) A Cyber Safety Training Manual Built for Teachers and Designed for Children, you position yourself at the forefront of educational guardianship, championing a future where our children can explore, learn, and grow online without fear. Join us on this journey to empower the next generation -- one click at a time!

9 特價6678
立即代訂
下次再買
頁數21/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing