0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

Mastering Serverless Computing with AWS Lambda

Ingram 出版
2024/11/15 出版

Design and Build Scalable Solutions on the AWS Serverless Ecosystem. Book DescriptionAWS Lambda, a key component of AWS Serverless Computing, has transformed application development by allowing developers to focus on code rather than infrastructure. [Mastering Serverless Computing with AWS Lambda] is a must-have guide for leveraging AWS Lambda to build efficient, cost-effective serverless cloud solutions. This book guides readers from serverless basics to advanced deployment, offering practical approaches to building resilient, scalable applications. Beginning with an introduction to serverless computing, the book explores AWS Lambda fundamentals, covering invocation models, service integrations, and event-driven design. Practical insights into hyper-scaling, instrumentation, and designing for failure empower readers to create robust, production-ready solutions. This guide covers core concepts of serverless computing, including optimizations, automation, and strategies to navigate potential pitfalls. It emphasizes AWS Lambda's resiliency, scalability, and disaster recovery, using real-world examples to showcase best practices. Each chapter offers in-depth examples, edge computing scenarios, and proven patterns to help readers develop optimized serverless architectures. By the end, readers will gain a comprehensive understanding of AWS Lambda, equipping them to design sophisticated systems that meet modern cloud demands and drive innovation within their organizations. Table of Contents1. Introduction to Serverless Computing2. AWS Lambda Basics3. Invocation Models and Service Integrations4. Event-Driven Design with Lambda5. Hyper-Scaling with Lambda6. Instrumenting Lambda7. Resiliency and Design for Failure8. Lambda-Less Design9. Edge Computing10. Patterns and Practices Index

9 特價1901
立即代訂
下次再買

Edge Computing - Edge 2024

Jing,Zeng  著
Springer 出版
2024/11/15 出版

This book constitutes the refereed proceedings of the 8th International Conference on Edge Computing, EDGE 2024, held in Bangkok, Thailand, during November 16-19, 2024. The 8 full papers included in this book were carefully reviewed and selected from 16 submissions. The papers presented focus on various topics such as Edge Storage, Edge Connections, Edge Analytics, Edge AI, Edge Processing Engine, Industry-Specific Edges, Edge Application Innovations, 5G and Edge, 5G and Cloud, AIGC for Edge.

9 特價3131
立即代訂
下次再買

Search Methods in Artificial Intelligence

Ingram 出版
2024/11/14 出版

This book is designed to provide in-depth knowledge on how search plays a fundamental role in problem solving. Meant for undergraduate and graduate students pursuing courses in computer science and artificial intelligence, it covers a wide spectrum of search methods. Readers will be able to begin with simple approaches and gradually progress to more complex algorithms applied to a variety of problems. It demonstrates that search is all pervasive in artificial intelligence and equips the reader with the relevant skills. The text starts with an introduction to intelligent agents and search spaces. Basic search algorithms like depth first search and breadth first search are the starting points. Then, it proceeds to discuss heuristic search algorithms, stochastic local search, algorithm A*, and problem decomposition. It also examines how search is used in playing board games, deduction in logic and automated planning. The book concludes with a coverage on constraint satisfaction.

9 特價3959
立即代訂
下次再買

Statistics with Rust, Second Edition

Ingram 出版
2024/11/14 出版

"Statistics with Rust, Second Edition" is designed to help you learn quickly, focusing on practical statistics using Rust scripts. The book is for readers who know the basics of statistics and machine learning. It gives quick explanations so you can try out concepts with hands-on coding. The book uses the newest version of Rust, 1.72.0, to help users build and secure statistical and machine learning algorithms. Each chapter is full of useful programs and code examples that will walk you through tasks like data manipulation, statistical tests, regression analysis, building machine learning models, and natural language processing.We've covered great Rust crates featured throughout, including: ndarray and ndarray-linalg: For efficient handling of multi-dimensional arrays and linear algebra operations.ndarray-stats: To perform statistical computations on arrays.rand and rand_distr: For generating random numbers and working with probability distributions.smartcore: A machine learning library used for implementing algorithms like decision trees and random forests.linfa: A toolkit providing implementations of Support Vector Machines and other algorithms.tch: Rust bindings for PyTorch, enabling the creation and training of neural networks.finalfusion: For working with word embeddings in natural language processing tasks.rust-stemmers: To perform stemming in text preprocessing.regex: For pattern matching and text manipulation.unicode-segmentation: To accurately tokenize Unicode strings.This second edition brings all chapters up to date with the latest in stats and Rust programming. It focuses on how you can put these things to practical use, with a detailed look at advanced algorithms like PCA, SVM, neural networks, and ensemble methods. We've also included some natural language processing topics, such as text preprocessing, tokenization, and word embeddings. The book also shows you how to combine Rust's performance and safety with statistical analysis, giving you the tools you need to do data analysis efficiently and reliably. The book's got lots of practical code and explanations that are easy to understand, which helps you learn the skills you need to get to grips with data using Rust.Table of ContentIntroduction to Rust for StatisticiansData Handling and PreprocessingDescriptive StatisticsProbability Distributions and Random VariablesInferential StatisticsRegression AnalysisBayesian StatisticsMultivariate Statistical MethodsNonlinear Models and Machine LearningModel Evaluation and ValidationText and Natural Language Processing

9 特價2394
立即代訂
下次再買

Cyber Election Meddling

Faton,Aliu  著
Ingram 出版
2024/11/13 出版

Cyber Election Meddling: The Impact on Voter Beliefs and Decisions explores the rise of cyber-influence campaigns that have shaped modern elections. Beginning with the 2016 U.S. presidential election, Russian state-sponsored organizations systematically deployed misinformation across social media and news outlets. This unprecedented effort undermined public trust in candidates and the electoral process, reshaping how voters perceived key issues and made decisions at the ballot box.This study takes a quantitative, non-experimental approach to examine the relationship between voters' belief in foreign election meddling and how it influences their decision-making process. Using the social cognitive theory as its framework, the research highlights the role of information sources in shaping voter perceptions, finding that those who relied on traditional news media rather than blogs or social media were more likely to recognize interference efforts.The findings of this research are compelling: awareness of cyber-meddling doesn't necessarily reduce its impact on voters. Better-educated individuals were likelier to detect these disinformation campaigns, yet their decision-making process remained susceptible. Cyber Election Meddling offers a timely, critical examination of how foreign influence operations affect democratic outcomes and public trust, with implications far beyond a single election.

9 特價770
立即代訂
下次再買

Principles and Applications of Vector Network Analyzer Calibration Techniques

Ingram 出版
2024/11/13 出版

This book summarizes the work developed over more than two decades in the field of advanced calibration techniques for vector network analyzers, by the RF and Microwave Group at The Center for Scientific Research and Higher Education of Ensenada, Baja California, Mexico, which is led by Dr. J. Apolinar Reynoso-Hern獺ndez, author of this book. This book is written so that every electrical engineer, with knowledge of electrical circuits and linear algebra basics, can understand the principles of VNA calibration techniques.Vector network analyzers are normally used by engineers and researchers working in the RF and microwave field, which usually requires advanced and specialized courses at graduate level. The reader should be able to implement any VNA calibration technique, decide the most adequate calibration for a given measurement condition, and interpret the measurement results, as a seasoned RF metrology expert. Principles and Applications of Vector Network Analyzer Calibration Techniques is a useful book for beginners and professionals working on: Microwave de-embedding and test fixture characterization Characterization of uniform transmission lines Load-pull measurements It is also: An ideal tutorial for professionals and postgraduate/research stu-dents taking courses in microwave calibration techniques A useful textbook for practicing electronics engineering and researchers working in the RF microwave field: calibration techniques and load-pull measurements

9 特價6786
立即代訂
下次再買

GraphQL Best Practices

Packt 出版
2024/11/13 出版

Get to grips with best practices, advanced techniques, and practical examples in TypeScript for building a scalable and secure backend with seamless frontend integrationKey Features: - Gain detailed guidance for crafting effective GraphQL schemas- Explore insights into securing and optimizing GraphQL applications- Learn through step-by-step examples, using TypeScript for practical learning- Purchase of the print or Kindle book includes a free PDF eBookBook Description: In the ever-evolving landscape of web development, GraphQL has emerged as a powerful query language that addresses the limitations of traditional REST APIs. This guide delves deep into GraphQL, starting with its foundational principles and swiftly advancing to complex topics that will equip you with the skills you need to understand this technology.As you progress, you'll cover advanced concepts such as schema design, security enhancements, and error handling. You'll also explore essential topics such as federation and the transition from REST to GraphQL, gaining a comprehensive understanding of these critical areas. The book helps you learn through practical examples in TypeScript, guiding you through building scalable and secure GraphQL backends. Additionally, you'll get up to speed with the intricacies of frontend integration.By the end of this book, you'll have the skills you need to implement real-world GraphQL solutions, creating efficient and robust applications that meet modern web development demands.What You Will Learn: - Understand the core principles of GraphQL- Integrate GraphQL with frontend technologies such as Node.js and Next.js- Optimize GraphQL queries for better performance- Deploy and maintain GraphQL applications with confidence- Explore schema design, security, and error handling- Scale GraphQL with modular schemasWho this book is for: This book is for developers interested in advancing their knowledge of GraphQL, from beginners curious about the basics to experienced developers looking to refine their schema design and security strategies. It's particularly ideal for backend developers, full-stack professionals, and frontend developers who wish to understand GraphQL from the ground up and apply advanced techniques in real-world scenarios. Additionally, this book is a must-read for anyone looking to make their applications more efficient and robust using GraphQL.Table of Contents- Unveiling the Holy Grail of Communication - GraphQL- Applying an AI-Friendly Approach to GraphQL - Crafting Effective GraphQL Schemas - Building Pipes- Transitioning from REST to GraphQL- Defining GraphQL Transformers- Understanding GraphQL Federation- Executing Schema-First Systems- Working on the Frontend with GraphQL- Keeping Data Secure - Describing Errors in GraphQL- Documenting your Schema- Tackling Schemas with Visualization- From an Idea to a Working Project - Backend Development with GraphQL and TypeScript- From an Idea to a Working Project - Frontend Integration with GraphQL and TypeScript

9 特價1835
立即代訂
下次再買

Human Vs ChatGPT - Language of Advertising in Beauty Products Advertisements

Ida,Skubis  著
Ingram 出版
2024/11/13 出版

The book explores how advertising is changing in the digital era, that are transforming traditional marketing techniques. It takes an in-depth look at the language used in advertising and its psychological effects, providing valuable information about the current trends and future developments in marketing and consumer engagement.

9 特價3600
立即代訂
下次再買

From Street-smart to Web-wise(R)

Al,Marcella  著
Ingram 出版
2024/11/13 出版

Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. This isn't just another book-it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.

9 特價3339
立即代訂
下次再買

From Street-smart to Web-wise(R)

Al,Marcella  著
Ingram 出版
2024/11/13 出版

Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. This isn't just another book-it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.

9 特價8352
立即代訂
下次再買

Nine Steps to Success

Alan,Calder  著
Ingram 出版
2024/11/12 出版

Essential guidance for anyone tackling ISO 27001:2022 implementation for the first time.ISO/IEC 27001:2022 is the blueprint for managing information security in line with an organisation's business, contractual and regulatory requirements, and its risk appetite. Nine Steps to Success has been updated to reflect the 2022 version of ISO 27001. This must-have guide from expert Alan Calder will help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success. The guide: Details the key steps of an ISO 27001 project from inception to certification;Explains each element of the ISO 27001 project in simple, non-technical language; andIs ideal for anyone tackling ISO 27001 implementation for the first time.To be resilient against cyber attacks, organisations must do more than just erect digital defences; a significant percentage of successful attacks originate in the physical world or are aided and exacerbated by environmental vulnerabilities. Effective cyber security therefore requires a comprehensive, systematic and robust ISMS (information security management system), with boards, customers and regulators all seeking assurance that information risks have been identified and are being managed.Successfully implement ISO 27001 with this must-have guide.

9 特價1988
立即代訂
下次再買

Exploring Web Components

Ingram 出版
2024/11/11 出版

Learn how to create reusable components to build modern Web user interfaces with standard technologies Key Features Learn how standard Web technologies allows you to build reusable UI components. Learn how to protect the look and the internal behavior of your components.Learn how to use Web Components in React, Angular, and Vue projects. Learn how to use third-party libraries and tools to simplify the process of building your components.Description The design of Web user interfaces has been growing significantly in recent times thanks to libraries like React, Angular, Vue. They allow you to create awesome UI components, but have a great drawback: their components are not interoperable.Web Components enable you to overcome this drawback by using a set of standard technologies.The book drives you in the exploration of these technologies with a practical approach. It describes how to create Custom Elements; how to protect their internal behavior by leveraging the Shadow DOM; how to simplify the UI definition through HTML templates.Also, you will discover how to distribute and use your Web Components and how to leverage libraries and tools to develop them.Throughout the book, you will carry out a Web Component project that will provide you with practical experience in using those technologies. What will you learn Use Custom Elements technology to define your HTML elements.Use Shadow DOM to protect the inner behavior of your UI components.Work with HTML templates to simplify and enhance the way you define the UI of your components.Reuse your Web Components in applications built with Vanilla JavaScript, React, Angular, and Vue.Who this book is forThis book is for frontend Web developers who want to leverage standard technologies to build reusable UI components. Basic knowledge of JavaScript, HTML, and CSS is required. Table of Contents 1. Getting Started with Web Components2. Extending HTML Elements3. Creating Custom Web Components4. Managing Properties and Attributes5. Handling Events6. Using the Shadow DOM7. Using HTML Templates8. Distributing and Extending Web Components9. Web Components and Other UI Frameworks10. Tools for Web Components Development About the Author Andrea Chiarelli is a software engineer and technical author with more than 20 years of experience in the software development industry. Throughout his career, he used several programming languages and technologies for the projects he was involved in. Lately, he is focusing on the JavaScript ecosystem both on the server and on the client-side.He has contributed to many online and offline magazines and authored a few books.Currently, he is working at Auth0 as an R&D Content Engineer. Your Blog links: https: //andreachiarelli.it/ Your LinkedIn Profile: https: //www.linkedin.com/in/andreachiarelli/

9 特價1055
立即代訂
下次再買

Smart Contract Development with Solidity and Ethereum

Akhil,Mittal  著
Ingram 出版
2024/11/11 出版

Create, develop and deploy a Smart Contract with ease Key Features Familiarize yourself with Blockchain terminology and its conceptsUnderstand and implement the Cryptography basic principlesUnderstand the life cycle of an Ethereum Transaction Explore and work with Dapps on EthereumA practical guide that will teach you to create and deploy Smart Contracts with Solidity DescriptionThe book covers the fundamentals of Blockchain in detail and shows how to create a Smart Contract with ease. This book is both for novices and advanced readers who want to revisit the Smart Contract development process. The book starts by introduces Blockchain, its terminology, its workflow, and cryptographic principles. You will get familiar with the basics of Ethereum and some Distributed apps available on Ethereum. Furthermore, you will learn to set-up Ethereum Blockchain on Azure. Then you will learn how to create, develop, and deploy a smart contract on Ethereum. Towards the end, you will understand what Blockchain uses and advantages in the real-world scenario. What will you learnGet familiar with the basics of Blockchain and BitcoinSetup a development environment for programming Smart ContractsLearn how to set up an Ethereum Blockchain on AzureUnderstand the basics of Solidity, an object-oriented programming language for writing smart contractsLearn how to test and deploy a smart contractWho this book is forThis book is for Developers, Architects, and Software/Technology Enthusiasts who are interested in Blockchain, Ethereum, and Smart Contracts. It is also for Developers who want to build a Blockchain-based DApps on Ethereum Network. It is for everyone who is learning Solidity and is looking to create and integrate Blockchain into their project.Table of Contents Section 1: What is Blockchain and how does it work? 1. Blockchain - The Concept2. Blockchain - Cryptographic PrinciplesSection 2: Ethereum and DAAPS 1. Distributed Applications 2. Setting up Ethereum Blockchain on AzureSection 3: Smart Contracts Development 1. Setting up an Environment for Smart Contracts Development2. Programming Smart ContractsSection 4: Blockchain in Real World 1. Blockchain-Offerings and Usages About the Author Akhil Mittal lives in Noida, India. He is two times Microsoft MVP (Most Valuable Professional) firstly awarded in 2016 continued in 2017 in Visual Studio and Technologies category, C# Corner MVP since 2013, Code Project MVP since 2014, a blogger, author and likes to write/read technical articles, blogs, and books. Akhil actively contributes his technical articles on CodeTeddy (www.codeteddy.com)He works as a Sr. Consultant with Magic EdTech (www.magicedtech.com) which is recognized as a global leader in delivering end to end learning solutions.He has an experience of more than 12 years in developing, designing, architecting enterprises level applications primarily in Microsoft Technologies. He has diverse experience in working on cutting edge technologies that include Microsoft Stack, AI, Machine Learning, Blockchain and Cloud computing. Akhil is an MCP (Microsoft Certified Professional) in Web Applications and Dot Net Framework.

9 特價759
立即代訂
下次再買

Homomorphic Encryption for Data Science (He4ds)

Allon,Adir  著
Springer 出版
2024/11/11 出版
9 特價3653
立即代訂
下次再買

Coding with ChatGPT and Other LLMs

Packt 出版
2024/11/11 出版

Leverage LLM (large language models) for developing unmatched coding skills, solving complex problems faster, and implementing AI responsiblyKey Features: - Understand the strengths and weaknesses of LLM-powered software for enhancing performance while minimizing potential issues- Grasp the ethical considerations, biases, and legal aspects of LLM-generated code for responsible AI usage- Boost your coding speed and improve quality with IDE integration- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Keeping up with the AI revolution and its application in coding can be challenging, but with guidance from AI and ML expert Dr. Vincent Hall-who holds a PhD in machine learning and has extensive experience in licensed software development-this book helps both new and experienced coders to quickly adopt best practices and stay relevant in the field.You'll learn how to use LLMs such as ChatGPT and Gemini to produce efficient, explainable, and shareable code and discover techniques to maximize the potential of LLMs. The book focuses on integrated development environments (IDEs) and provides tips to avoid pitfalls, such as bias and unexplainable code, to accelerate your coding speed. You'll master advanced coding applications with LLMs, including refactoring, debugging, and optimization, while examining ethical considerations, biases, and legal implications. You'll also use cutting-edge tools for code generation, architecting, description, and testing to avoid legal hassles while advancing your career.By the end of this book, you'll be well-prepared for future innovations in AI-driven software development, with the ability to anticipate emerging LLM technologies and generate ideas that shape the future of development.What You Will Learn: - Utilize LLMs for advanced coding tasks, such as refactoring and optimization- Understand how IDEs and LLM tools help coding productivity- Master advanced debugging to resolve complex coding issues- Identify and avoid common pitfalls in LLM-generated code- Explore advanced strategies for code generation, testing, and description- Develop practical skills to advance your coding career with LLMsWho this book is for: This book is for experienced coders and new developers aiming to master LLMs, data scientists and machine learning engineers looking for advanced techniques for coding with LLMs, and AI enthusiasts exploring ethical and legal implications. Tech professionals will find practical insights for innovation and career growth in this book, while AI consultants and tech hobbyists will discover new methods for training and personal projects.Table of Contents- What is ChatGPT and What are LLMs?- Unleashing the Power of LLMs for Coding: A Paradigm Shift- Code Refactoring, Debugging, and Optimization: A Practical Guide- Demystifying Generated Code for Readability- Addressing Bias and Ethical Concerns in LLM-Generated Code- Navigating the Legal Landscape of LLM-Generated Code- Security Considerations and Measures- Limitations of Coding with LLMs- Cultivating Collaboration in LLM-Enhanced Coding- Expanding the LLM Toolkit for Coders: Beyond LLMs- Helping Others and Maximizing Your Career with LLMs- The Future of LLMs in Software Development

9 特價2064
立即代訂
下次再買

Let's Talk Podcasting

Ingram 出版
2024/11/09 出版

Want to create a successful podcast? Here's how to do it right. In Let's Talk Podcasting, seasoned podcast producer Amanda Cupido gives you the inside scoop on this burgeoning industry's biggest players and- more importantly-how you can join them.Leading with a solid foundation of podcasting's history and significance in our increasingly content-hungry world, she provides an invaluable insider's perspective on what makes top-rated podcasts so successful, where the medium is headed in the future, and everything you need to start your own podcast today. With sharp wit and plenty of illuminating anecdotes from her own foray into podcasting professionally, Cupido has written a book that will have you ready to hit record in no time.- NEW EDITION UPDATED WITH THE LATEST INFORMATION AND TRENDS: Get ready for fresh takes on where the industry is headed, six new chapters and a foreword by Erika Casupanan, winner of the reality competition Survivor and host of the podcast, Happy to See Me.- A ONE-STOP RESOURCE FOR CURRENT AND ASPIRING PODCASTERS: From covering its history, to laying out the current scene, to predicting what's next, Cupido tells readers everything they need to know to become podcasting experts themselves. Her practical and thoughtful advice on the technical aspects of podcasting make it accessible to aspiring podcasters at any level.- LEARN ABOUT MONETIZATION: Cupido's new book not only ensures that readers will be able to start their own podcasts with ease, but also emphasizes that podcasting can be a career. She covers how podcasts are monetized and gives helpful tips on how to create/sell ads for your own.- GET AN INSIDER'S PERSPECTIVE: Cupido paints a picture of the current podcasting landscape with an insightful, witty insider's perspective. Whether she's sharing her knowledge of podcast heavyweights or recounting the steps she took to produce her own award-winning podcasts, Cupido does it with the kind of strong, authentic voice you would expect from a seasoned audio storyteller.

9 特價682
立即代訂
下次再買

Enigma Myth Deciphered

Marek,Grajek  著
Springer 出版
2024/11/09 出版

This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma. The author uses his experience as a cryptologist to fill in gaps in the sources or to correct misguided interpretations, also adding the passion of a journalist, drawing a vivid picture of the characters and the story. As a Pole, he presents this story through the lens of the fate of the Polish mathematicians who were the first to break the cipher as early as 1932 and laid the foundations for the subsequent Allied success. The book's coverage ranges from the mathematical foundations of codebreaking, through the complex fates of the people and organisations involved in the attacks on the Enigma ciphers, the impact of decrypts on the fate of the major campaigns of the Second World War, to the role that wartime cryptology and codebreakers played in the birth of digital civilisation. The Polish mathematicians' story is presented in the full context of the struggle with the cipher, including the complex interplay between codebreakers, military commanders and politicians of the UK, US, Poland, France, and the Third Reich. By looking at events through the eyes of a cryptologist rather than solely as a historian, the reader is given a glimpse into the backstage of the cryptologic workshop; a better understanding of the scale and nature of the challenges codebreakers faced; and insights into their responses to those challenges, as well as the emotions, dilemmas, disappointments, and triumphs involved.

9 特價2609
立即代訂
下次再買

Segment Routing in MPLS Networks

Packt 出版
2024/11/07 出版

Unlock the power of segment routing (SR-MPLS) and fast reroute (FRR) techniques through immersive hands-on labs to revolutionize your understanding and implementation of next-gen MPLS protocolKey Features: - Carry out practical labs to thoroughly grasp and execute MPLS, SR-MPLS, and FRR techniques- Master SR-MPLS and LDP interoperability for seamless integration and efficient network operation- Implement TI-LFA FRR methods for seamless SR-MPLS deployment in production- Purchase of the print or Kindle book includes a free PDF eBookBook Description: In this book, you will learn about segment routing (SR), a cornerstone of modern networking, and topology-independent loop-free alternate (TI-LFA), with hands-on labs to hit the ground running. Written by a key contributor to global segment routing multiprotocol label switching (SR-MPLS) network designs, this book makes learning SR-MPLS both accessible and insightful.The book offers an extensive learning path, taking you from a traditional MPLS network using the label distribution protocol (LDP) to a modern SR-MPLS network using SR, and provides a holistic view of their interworking. You'll also explore TI-LFA fast reroute protection scenarios, and find out how SR-MPLS strengthens network reliability with its source routing paradigm. Using intermediate system-to-intermediate system (IS-IS) as the foundational link-state routing protocol, the chapters ensure that you get a clear understanding of both SR and IS-IS. Following a consistent network topology throughout, this book enables smooth transitions between scenarios, helping you master the technical concepts without distraction.By the end of this book, you'll have a solid grasp of MPLS, SR-MPLS, and TI-LFA fast reroute techniques, ready to tackle real-world networking challenges with confidence. What You Will Learn: - Gain a complete understanding of MPLS and its role in network infrastructures- Develop practical skills to implement SR-MPLS using Cisco IOS-XRv9k and real-life use cases- Acquire hands-on experience with MPLS networks using the IS-IS and LDP protocols- Orchestrate the gradual transition from traditional MPLS to SR-MPLS networks and manage their interworking- Master fast reroute techniques in SR-MPLS networks, including TI-LFA, for efficient traffic rerouting- Implement path protection methods to ensure network resilience and stabilityWho this book is for: This book is for MPLS professionals and network engineers looking to deepen their knowledge in SR and TI-LFA. A basic understanding of MPLS networks is a prerequisite, but worry not-the book also covers foundational MPLS concepts, ensuring network enthusiasts can follow along without any problem. This book is specifically designed for network engineering, operations, and design professionals, covering advanced techniques such as TI-LFA for path protection, empowering you to evolve MPLS networks with SR-MPLS seamlessly.Table of ContentsIntroduction to Multiprotocol Label Switching (MPLS)Lab 1 - Getting Started with LDP-Based MPLS NetworkLab 2 - Introducing Segment Routing MPLS (SR-MPLS)Lab 3 - SR-LDP InterworkingLab 4 - Introducing TI-LFA (Topology Independent - Loop-Free Alternate)Lab 5 - Zero-Segment FRRLab 6 - Single-Segment FRRLab 7 - Double-Segment FRRLab 8 - Microloop AvoidanceLab 9 - TI-LFA Node ProtectionLab 10 - TI-LFA Local SRLG-Disjoint ProtectionLab 11 - TI-LFA Global Weighted SRLG ProtectionLab 12 - TI-LFA Node + SRLG ProtectionLab 13 - TI-LFA Tiebreaker

9 特價2064
立即代訂
下次再買

Cisco Catalyst Sd-WAN

Cisco Press 出版
2024/11/07 出版

Unleash the power of Cisco SD-WAN with this comprehensive guide to design, deployment, and security. Cisco Catalyst SD-WAN: Design, Deploy, and Secure Your WAN is your definitive guide to mastering Cisco's Software-Defined Wide Area Networking. This comprehensive resource equips you with the knowledge and skills to optimize performance and enhance security for your organization's network. Whether you're an IT professional, network engineer, or system administrator, this completely revised edition provides the essential tools and knowledge you need to excel in today's demanding networking landscape. With insights from four leading Cisco technology experts, this book also helps you prepare for the CCNP Enterprise Implementing Cisco SD-WAN Solutions ENSDWI 300-415 exam. Covering all of the exam topics, this is the only self-study resource approved by Cisco. It provides a proven test-preparation routine to help you pass the ENSDWI 300-415 exam on your first attempt. Exam preparation features include: Chapter-ending review questions to reinforce your learning The powerful Pearson Test Prep Practice Test software with exam-realistic questions and detailed performance reports An online Flash Cards application to help you drill on Key Terms by chapter Key Features: Architectural Mastery: Understand the key components and benefits of Cisco SD-WAN Efficient Design and Migration: Learn the steps to transition your network smoothly to Cisco Catalyst SD-WAN Policy Implementation: Gain detailed insights into SD-WAN policies and their application Advanced Security: Discover techniques to safeguard your network effectively Up-to-date Content: Includes new chapters on Cloud OnRamp, monitoring, and troubleshooting Content Update Program: This fully updated second edition includes the latest topics and additional information covering changes to the latest CCNP Enterprise Implementing Cisco SD-WAN Solutions ENSDWI 300-415 exam. Visit ciscopress.com for information on annual digital updates for this book that align to Cisco exam blueprint version changes. This extensively updated new edition contains updated policy chapters to include new technologies, such as: Enhanced App Aware Routing Coverage of configuration and policy groups Completely updated security content including segmentation New chapters on Cloud OnRamp and monitoring and troubleshooting Companion Website: The companion website contains the Pearson Test Prep practice test software with two full exams for the CCNP Enterprise ENSDWI 300-415 exam and Key Terms flash cards.

9 特價3671
立即代訂
下次再買

Wireless LAN Security in a SOHO Environment

Ingram 出版
2024/11/07 出版

Bachelor Thesis from the year 2006 in the subject Computer Science - Internet, New Technologies, grade: 1,7, University of Wales, North East Wales Institute, Wrexham, Gro?britannien (University of Wales, North East Wales Institute, Wrexham, Gro?britannien), language: English, abstract: This paper addresses the theory and reality of Wi-Fi security. It provides an overview of security mechanisms and explains how security works in wireless networks. The most important security protocols that are relevant for small office or home office environments are looked upon in more detail. The security of a real-world wireless network is being tested with freely available tools and popular attacking methods. It is demonstrated that old security protocols can no longer be seen as being secure at all. To create a holistic view the idea of Wi-Fi security is then expanded to include the physical level. A series of experiments provides insight on how to make a network more secure with materials and tools available in every household. A WLAN that is nearly unreachable outside the perimeter does not attract any potential hackers. The paper concludes with recommendations on where to place your access point and what can be done to shield it.

9 特價2787
立即代訂
下次再買

Elliptic Curve Cryptography for Developers

Ingram 出版
2024/11/06 出版

Make your public key protocols smaller and more secure with this accessible guide to Elliptic Curve Cryptography. Elliptic Curve Cryptography for Developers introduces the mathematics of elliptic curves--a powerful alternative to the prime number-based RSA encryption standard. You'll learn to deliver zero-knowledge proofs and aggregated multi-signatures that are not even possible with RSA mathematics. All you need is the basics of calculus you learned in high school. Elliptic Curve Cryptography for Developers includes: - Clear, well-illustrated introductions to key ECC concepts - Implementing efficient digital signature algorithms - State of the art zero-knowledge proofs - Blockchain applications with ECC-backed security The book gradually introduces the concepts and subroutines you'll need to master with diagrams, flow charts, and accessible language. Each chapter builds on what you've already learned, with step-by-step guidance until you're ready to write embedded systems code with advanced mathematical algorithms. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology The Elliptic Curve Cryptography (ECC) protocol secures everything from credit card transactions to the blockchain. With a little C code, high school calculus, and the techniques in this book, you can implement ECC cryptographic protocols that are smaller and more secure than the RSA-based systems in common use today. About the book Elliptic Curve Cryptography for Developers teaches you how ECC protocols work and how to implement them seamlessly in C code. Unlike academic cryptography books, this practical guide sticks to the minimum math and theory you need to get the job done. Author Mike Rosing illustrates each concept with clear graphics, detailed code, and hands-on exercises. As you go, you'll practice what you learn by building two encryption systems for a blockchain application. What's inside - Efficient digital signature algorithms - Zero-knowledge proofs - ECC security for blockchain applications About the reader Readers need to understand basic calculus. Examples in C. About the author Michael Rosing's career as a scientist, hardware engineer, and software developer includes high-energy physics, telephone switch engineering, and developing vision devices for the blind. The technical editor on this book was Mark Bissen. Table of Contents 1 Pairings over elliptic curves in cryptography Part 1 2 Description of finite field mathematics 3 Explaining the core of elliptic curve mathematics 4 Key exchange using elliptic curves 5 Prime field elliptic curve digital signatures explained 6 Finding good cryptographic elliptic curves Part 2 7 Description of finite field polynomial math 8 Multiplication of polynomials explained 9 Computing powers of polynomials 10 Description of polynomial division using Euclid's algorithm 11 Creating irreducible polynomials 12 Taking square roots of polynomials Part 3 13 Finite field extension curves described 14 Finding low embedding degree elliptic curves 15 General rules of elliptic curve pairing explained 16 Weil pairing defined 17 Tate pairing defined 18 Exploring BLS multi-signatures 19 Proving knowledge and keeping secrets: Zero knowledge using pairings Appendix A Code and tools Appendix B Hilbert class polynomials Appendix C Variables list

9 特價2753
立即代訂
下次再買

Google JAX Cookbook

Zephyr,Quent  著
Ingram 出版
2024/11/06 出版

This is the practical, solution-oriented book for every data scientists, machine learning engineers, and AI engineers to utilize the most of Google JAX for efficient and advanced machine learning. It covers essential tasks, troubleshooting scenarios, and optimization techniques to address common challenges encountered while working with JAX across machine learning and numerical computing projects.The book starts with the move from NumPy to JAX. It introduces the best ways to speed up computations, handle data types, generate random numbers, and perform in-place operations. It then shows you how to use profiling techniques to monitor computation time and device memory, helping you to optimize training and performance. The debugging section provides clear and effective strategies for resolving common runtime issues, including shape mismatches, NaNs, and control flow errors. The book goes on to show you how to master Pytrees for data manipulation, integrate external functions through the Foreign Function Interface (FFI), and utilize advanced serialization and type promotion techniques for stable computations.If you want to optimize training processes, this book has you covered. It includes recipes for efficient data loading, building custom neural networks, implementing mixed precision, and tracking experiments with Penzai. You'll learn how to visualize model performance and monitor metrics to assess training progress effectively. The recipes in this book tackle real-world scenarios and give users the power to fix issues and fine-tune models quickly.Key LearningsGet your calculations done faster by moving from NumPy to JAX's optimized framework.Make your training pipelines more efficient by profiling how long things take and how much memory they use.Use debugging techniques to fix runtime issues like shape mismatches and numerical instability.Get to grips with Pytrees for managing complex, nested data structures across various machine learning tasks.Use JAX's Foreign Function Interface (FFI) to bring in external functions and give your computational capabilities a boost.Take advantage of mixed-precision training to speed up neural network computations without sacrificing model accuracy.Keep your experiments on track with Penzai. This lets you reproduce results and monitor key metrics.Create your own neural networks and optimizers directly in JAX so you have full control of the architecture.Use serialization techniques to save, load, and transfer models and training checkpoints efficiently.Table of ContentTransition NumPy to JAXProfiling Computation and Device MemoryDebugging Runtime Values and ErrorsMastering Pytrees for Data StructuresExporting and SerializationType Promotion Semantics and Mixed PrecisionIntegrating Foreign Functions (FFI)Training Neural Networks with JAX

9 特價2394
立即代訂
下次再買

Smart Home and Industrial IoT Devices

Ingram 出版
2024/11/06 出版

Smart Home and Industrial IoT Devices: Critical Perspectives on Cyber Threats, Frameworks and Protocols provides an in-depth examination of the Internet of Things (IoT) and its profound impact on smart homes and industrial systems. The book begins by exploring the significance of IoT in smart homes, followed by an analysis of emerging cyber threats targeting smart homes and cyber-physical systems. It presents AI and machine learning-based frameworks for monitoring water quality and managing irrigation in agriculture, highlighting their role in IoT ecosystems. The text also discusses a framework to mitigate cyber-attacks on robotic systems and introduces a multinomial naive Bayesian classifier for analyzing smart IoT devices. Dataflow analysis and modeling experiments are detailed, along with a comparison of IoT communication protocols using anomaly detection and security assessment. The book concludes with a discussion on efficient, lightweight intrusion detection systems and a unique taxonomy for IoT frameworks. This book is ideal for students, researchers, and professionals seeking to understand and secure IoT environments.

9 特價3257
立即代訂
下次再買

Overlay-Integrated Heterogeneous Wireless Networks

Sajal,Saha  著
Ingram 出版
2024/11/05 出版

Mobile computing for Personal Communication Service (PCS) enables users with reliable, bi-directional internet access anytime, anywhere. Mobile IP, as a network layer protocol, addresses mobile computing needs. Terminal mobility and service area changes make efficient IP mobility crucial in minimizing packet loss and handover latency in heterogeneous networks. This work presents an in-depth analysis of mobile IP protocols and evaluates the GTP protocol's performance in a customized heterogeneous network, focusing on handoff. We propose an overlay-based architecture for heterogeneous networks, including 2G/2.5G/3G/WLAN/WiMax, and a crossover switch to manage vertical handoff and interlayer mobility. Simulations using NS-2 show that the proposed GWON (Global Wireless Overlay Network) architecture enables vertical handoff between networks with minimal delay and no call drops. The results demonstrate improved handoff delay compared to existing protocols.

9 特價2937
立即代訂
下次再買

Open Source Intelligence (Osint) - A Practical Introduction

Varin,Khera  著
Ingram 出版
2024/11/05 出版

This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking techniques, privacy best practices for OSINT researchers, and practical examples of OSINT investigations.

9 特價3914
立即代訂
下次再買

RLO by Classification Algorithms

Ingram 出版
2024/11/05 出版

Learning styles has gained widespread recognition in education theory and classroom management strategy. Individual learning styles depend on cognitive, emotional and environmental factors, as well as one's prior experience. This research work comprises defining method which uses questionnaires to determine the student's learning style and then adapt their behavior according to the learning styles. This research work uses primarily, personality trait test (PTT) is used to predict the learning behavior of the student. After that empirical relationship between the Kolb's learning style and learning computer programming skills through classification algorithms was analyzed. The performance of the research work has been evaluated through experimental results.

9 特價3993
立即代訂
下次再買

Transforming IoT Connectivity

Jiliang,Wang  著
Ingram 出版
2024/11/05 出版

As the Internet of Things (IoT) rapidly evolves, it fosters numerous innovative applications that connect low-data-rate, low-power devices. Traditional wireless technologies struggle to meet these connectivity needs, leading to the exploration of Low-Power Wide Area Networks (LPWAN) for long-distance communication. This book addresses critical challenges in LPWAN technologies for large-scale deployments, including transmission conflicts, weak signals, and interference from diverse protocols. We present a novel collision decoding mechanism that enhances network throughput, a weak signal enhancement mechanism for improved signal quality in complex environments, and a wide-area heterogeneous interconnection technology for effective communication across different technologies. Our large-scale deployment, connecting thousands of smart city devices, validates the effectiveness of these solutions, providing a vital resource for researchers and practitioners in IoT connectivity.

9 特價3350
立即代訂
下次再買

IT Governance

Alan,Calder  著
Ingram 出版
2024/11/05 出版

Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.g. the GDPR (General Data Protection Regulation); andReview key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance.Fully updated to align with ISO 27001/27002:2022IT Governance - An international guide to data security and ISO 27001/ISO 27002, Eighth edition provides: Expert information security management and governance guidance based on international best practice;Guidance on how to protect and enhance your organisation with an ISO 27001:2022-compliant ISMS; andDiscussion around the changes to international legislation, including ISO 27001:2022 and ISO 27002:2022.As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.

9 特價3807
立即代訂
下次再買

Optimizing Cloud Networks by Means of Topology

Ali,Zayeri  著
Ingram 出版
2024/11/05 出版

Cloud issues and cloud storage are becoming more and more important today than ever before. In the cloud, it is very difficult to decide what data needs security or what data does not require security, but the level of security required for the data is classified according to the specifications and Data features will be easy. On the cloud server, all data is stored in one of two ways: encrypting the data and storing it in the cloud servers, and storing data on the cloud servers without encryption, both of which can Encounter confidentiality issues because data has different values and properties that need to be specified before sending to cloud servers. In a cloud environment, user data on remote servers that are not physically recognized by customers and stored over the Internet must have unique confidentiality levels. In this research, a cloud classification data model is proposed to solve the confidentiality issues in cloud computing environment. Data categorization and security issues are performed according to their level of sensitivity. One of the most important parameters in improving the quality of the proposed model is time management.

9 特價3304
立即代訂
下次再買

Evaluation of the Comparison Between Digital Marketing Strategies

Ingram 出版
2024/11/05 出版

This evaluation examines the differences in digital marketing strategies employed by local and international companies. It focuses on how each approach influences consumer engagement, brand visibility, and overall marketing effectiveness. By analyzing various case studies and metrics, the study aims to identify key strengths and weaknesses of both strategies, offering insights into best practices for optimizing digital marketing efforts. The findings will provide valuable recommendations for businesses seeking to enhance their digital presence in a competitive marketplace.

9 特價2983
立即代訂
下次再買

The Routledge Handbook of Privacy and Social Media

Routledge 出版
2024/11/04 出版

This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors - such as culture, gender, and trust - and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.Chapter 22 and Chapter 30 of this book are freely available as downloadable Open Access PDFs at http: //www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.

9 特價3131
立即代訂
下次再買

Zero to Hero

Ingram 出版
2024/11/04 出版

Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book stands as a beacon of clarity and practical wisdom.

9 特價1930
立即代訂
下次再買

Surviving a Cyberattack

Ingram 出版
2024/11/04 出版

Surviving a Cyberattack: Securing Social Media and Protecting Your Home is a roadmap to protecting your home against cybercrime. This comprehensive guide addresses the ever-growing challenges users face from the potential of cybercrime in the technology-connected world. It explores various online risks, from social media scams and data breaches to fraud. Recognizing these threats is crucial for protecting yourself, your loved ones, and even your small business. This hands-on reference equips you with the knowledge and tools to navigate the online landscape safely. It covers essential topics like securing your router and social media accounts, protecting personal information, and mitigating risks for children and vulnerable adults. Additionally, it offers valuable insights on online shopping safety, responsible technology disposal, and surviving a cyberattack. FEATURES: Explains how to protect children, foster responsible online habits, manage their digital access, and keep them safe from harm.Includes sections on caring for vulnerable family members, protecting them from online predators, managing their digital accounts, and how to handle sensitive topics like digital estate planning.Provides practical checklists for social media security settings, router configuration, and data backup procedures.Discusses how to survive a cyberattack including data backup strategies, reporting procedures, and steps to take after a security breach.

9 特價1368
立即代訂
下次再買

Information Technology for Peace and Security

Springer Vieweg 出版
2024/11/04 出版

Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security. It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.

9 特價3392
貨到通知
下次再買

Applications and Techniques in Information Security

Springer 出版
2024/11/04 出版

This book constitutes the refereed proceedings of the 14th International Conference, on Applications and Techniques in Information Security, ATIS 2024, held in Tamil Nadu, India, November 22-24, 2024. The 24 full papers presented were carefully reviewed and selected from 149 submissions. The conference focuses on Advancing Quantum Computing and Cryptography; AI-Driven Cybersecurity: The Role of Machine Learning; Advancing Cybersecurity with Deep Learning Techniques; and Securing Connected Systems: IoT, Cloud, and Web Security Strategies.

9 特價4697
立即代訂
下次再買

Cyber Certainty

Daniel,Tobok  著
Ingram 出版
2024/11/03 出版

In today's digital age, safeguarding your corporation's digital assets is not just a necessity; it's an imperative. Daniel Tobok presents an enlightening guide to cyber security, meticulously designed to demystify the complex world of cyber protection for business leaders. This guide is your key to understanding the crucial dialogue between business executives and cybersecurity experts.Crafted with the business leader in mind, this guide transcends the usual technical jargon, making it accessible at any level of corporate leadership, especially for those in senior positions. Through the use of engaging case studies, it offers a panoramic view of the lessons learned by corporations in the cyber battlefield, providing invaluable insights into navigating the digital threats that loom over businesses today.Whether you're a seasoned executive or stepping into leadership, this book is an indispensable resource, empowering you to take charge of your company's cyber security strategy. Embrace the opportunity to fortify your digital defenses and ensure the longevity and success of your business in the digital realm.

9 特價1024
立即代訂
下次再買

Advances in Quantitative Ethnography

Springer 出版
2024/11/03 出版

This two-volume set CCIS 2278-2279 constitutes the refereed proceedings of the 6th International Conference on Advances in Quantitative Ethnography, ICQE 2024, held in Philadelphia, PA, USA, during November 3-7, 2024. The 31 full papers and 10 short papers included in this book were carefully reviewed and selected from 82 submissions. They are organized in the following topical sections: Theory and Methods; Teaching and Learning; and Cultural Discourse.

9 特價4436
立即代訂
下次再買

Weka Practice

Jose,P  著
Ingram 出版
2024/11/03 出版

Weka is a strong yet approachable machine learning and data mining tool. Data mining and big data are hot topics right now. Rather than diving into intricate mathematical theories or sophisticated algorithmic details, this course emphasizes hands-on experience with Weka and the practical applications of data mining tools and techniques. In addition to performing text classification and working with datasets with millions of instances, students will also investigate clustering, association rules, and other topics.

9 特價2203
立即代訂
下次再買

Advances in Quantitative Ethnography

Springer 出版
2024/11/03 出版

This two-volume set CCIS 2278-2279 constitutes the refereed proceedings of the 6th International Conference on Advances in Quantitative Ethnography, ICQE 2024, held in Philadelphia, PA, USA, during November 3-7, 2024. The 31 full papers and 10 short papers included in this book were carefully reviewed and selected from 82 submissions. They are organized in the following topical sections: Theory and Methods; Teaching and Learning; and Cultural Discourse.

9 特價4436
立即代訂
下次再買

Applications of 5G and Beyond in Smart Cities

Ambar,Bajpai  著
Ingram 出版
2024/11/01 出版

This book explores the potential of 5G and beyond technologies in smart city setup, including introduction to 5G along with challenges, limitations, and research areas. Applications related to Visible Light Communication, network management in smart cities, role of 5G in various areas, and 6G research framework are included.

9 特價3444
立即代訂
下次再買

Zero to Hero

Ingram 出版
2024/11/01 出版

Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book stands as a beacon of clarity and practical wisdom.

9 特價8352
立即代訂
下次再買

Cyber Security Using Modern Technologies

Om,Pal  著
Ingram 出版
2024/11/01 出版

The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security.

9 特價3339
立即代訂
下次再買

Cyber Warfare, Security and Space Computing

Springer 出版
2024/11/01 出版

This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024. The 27 papers presented here were carefully reviewed and selected from 333 submissions. These papers focus on various domains of Cyber warfare and Space computing, including emerging research and applications in the field.

9 特價4436
貨到通知
下次再買

Exploring The Intersection Of Artificial Intelligence And Cyber Defense

Ingram 出版
2024/11/01 出版

This book explores the groundbreaking role of artificial intelligence in reshaping cybersecurity, offering a thorough foundation in AI concepts and their application to modern threat detection and response. By examining how machine learning algorithms and advanced AI techniques are transforming cyber threat identification and management, it provides a clear view of the power of AI-driven solutions. Through detailed discussions, it illustrates how AI automates critical processes such as incident response, predictive analytics, and behavioral analysis, showcasing the technology's ability to uncover vulnerabilities and defend against sophisticated threats like zero-day exploits.In addition to practical case studies demonstrating AI's integration into current security frameworks, the book addresses essential ethical and privacy considerations, emphasizing the need for a balanced approach in deploying AI for cybersecurity. The final chapters look ahead, exploring the future landscape of AI in cyber defense and examining upcoming trends and challenges. For professionals and enthusiasts alike, this comprehensive guide delivers valuable insights into leveraging AI to build stronger, more resilient cybersecurity systems.

9 特價917
立即代訂
下次再買

Web3

Ken,Huang  著
Ingram 出版
2024/10/31 出版

Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA students and industry professionals explores key Web3 concepts, starting from foundational principles and moving to advanced topics like blockchain, smart contracts, tokenomics, and DeFi. The book takes a clear, practical approach to demystify the tech behind NFTs and DAOs as well as the complex regulatory landscape. It confronts challenges of blockchain scalability, a barrier to mainstream adoption of this transformative technology, and examines smart contracts and the growing ecosystem leveraging their potential. The book also explains the nuances of tokenomics, a vital element underpinning Web3's new economic model. This book is ideal for readers seeking to stay on top of emerging trends in the digital economy.

9 特價2969
立即代訂
下次再買

Enhancing Your Cloud Security with a CNAPP Solution

Packt 出版
2024/10/30 出版

Implement the entire CNAPP lifecycle from designing, planning, adopting, deploying, and operationalizing to enhance your organization's overall cloud security posture.Key Features: - Master the CNAPP lifecycle from planning to operationalization using real-world practical scenarios.- Dive deep into the features of Microsoft's Defender for Cloud to elevate your organization's security posture.- Explore hands-on examples and implementation techniques from a leading expert in the cybersecurity industryBook Description: Cloud security is a pivotal aspect of modern IT infrastructure, essential for safeguarding critical data and services. This comprehensive book explores Cloud Native Application Protection Platform (CNAPP), guiding you through adopting, deploying, and managing these solutions effectively. Written by Yuri Diogenes, Principal PM at Microsoft, who has been with Defender for Cloud (formerly Azure Security Center) since its inception, this book distills complex concepts into actionable knowledge making it an indispensable resource for Cloud Security professionals.The book begins with a solid foundation detailing the why and how of CNAPP, preparing you for deeper engagement with the subject. As you progress, it delves into practical applications, including using Microsoft Defender for Cloud to enhance your organization's security posture, handle multicloud environments, and integrate governance and continuous improvement practices into your operations.Further, you'll learn how to operationalize your CNAPP framework, emphasizing risk management & attack disruption, leveraging AI to enhance security measures, and integrating Defender for Cloud with Microsoft Security Exposure Management. By the end, you'll be ready to implement and optimize a CNAPP solution in your workplace, ensuring a robust defense against evolving threats.What You Will Learn: - Implement Microsoft Defender for Cloud across diverse IT environments- Harness DevOps security capabilities to tighten cloud operations- Leverage AI tools such as Microsoft Copilot for Security to help remediate security recommendations at scale- Integrate Microsoft Defender for Cloud with other XDR, SIEM (Microsoft Sentinel) and Microsoft Security Exposure Management- Optimize your cloud security posture with continuous improvement practices- Develop effective incident response plans and proactive threat hunting techniquesWho this book is for: This book is aimed at Cloud Security Professionals that work with Cloud Security, Posture Management, or Workload Protection. DevOps Engineers that need to have a better understanding of Cloud Security Tools and SOC Analysts that need to understand how CNAPP can enhance their threat hunting capabilities can also benefit from this book. Basic knowledge of Cloud Computing, including Cloud Providers such as Azure, AWS, and GCP is assumed.Table of Contents- Why CNAPP?- Assessing your Environment's Security Posture- CNAPP Design Considerations- Creating an Adoption Plan- Elevating your Workload's Security Posture- Multicloud- DevOps Security Capabilities- Governance and Continuous Improvement- Proactive Hunting- Implementing Workload Protection- Protecting Compute resources (Servers and Containers)- Protecting Storage and Databases- Protecting APIs- Protecting Service Layer- Incident Response- Leveraging AI to Improve your Security Posture- Extended Security Posture Management (XSPM)

9 特價2294
立即代訂
下次再買

Information and Communication Technologies

Springer 出版
2024/10/30 出版

This book constitutes the refereed proceedings of the 12th Ecuadorian Conference on Information and Communication Technologies, TICEC 2024, held in Loja, Ecuador, during October 16-18, 2024. The 24 full papers presented here were carefully reviewed and selected from 74 submissions. They were organized in the following topical sections: Image Processing, Classification, and Segmentation; Artificial Intelligence and Machine Learning Applications; IoT, Embedded Systems, and Applications in Healthcare and Industrial Environments.

9 特價4697
立即代訂
下次再買

Security and Privacy in Smart Environments

Springer 出版
2024/10/30 出版
9 特價2870
立即代訂
下次再買
頁數21/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing