0101~0102_天獄園2
1231~0102_金網寒假動漫節

英文書 > 全部商品

Principles and Applications of Vector Network Analyzer Calibration Techniques

2024/11/13 出版

This book summarizes the work developed over more than two decades in the field of advanced calibration techniques for vector network analyzers, by the RF and Microwave Group at The Center for Scientific Research and Higher Education of Ensenada, Baja California, Mexico, which is led by Dr. J. Apolinar Reynoso-Hern獺ndez, author of this book. This book is written so that every electrical engineer, with knowledge of electrical circuits and linear algebra basics, can understand the principles of VNA calibration techniques.Vector network analyzers are normally used by engineers and researchers working in the RF and microwave field, which usually requires advanced and specialized courses at graduate level. The reader should be able to implement any VNA calibration technique, decide the most adequate calibration for a given measurement condition, and interpret the measurement results, as a seasoned RF metrology expert. Principles and Applications of Vector Network Analyzer Calibration Techniques is a useful book for beginners and professionals working on: Microwave de-embedding and test fixture characterization Characterization of uniform transmission lines Load-pull measurements It is also: An ideal tutorial for professionals and postgraduate/research stu-dents taking courses in microwave calibration techniques A useful textbook for practicing electronics engineering and researchers working in the RF microwave field: calibration techniques and load-pull measurements

9 特價6201
立即代訂
下次再買

Nine Steps to Success

Alan,Calder  著
Itgp 出版
2024/11/12 出版

Essential guidance for anyone tackling ISO 27001:2022 implementation for the first time.ISO/IEC 27001:2022 is the blueprint for managing information security in line with an organisation's business, contractual and regulatory requirements, and its risk appetite. Nine Steps to Success has been updated to reflect the 2022 version of ISO 27001. This must-have guide from expert Alan Calder will help you get to grips with the requirements of the Standard and make your ISO 27001 implementation project a success. The guide: Details the key steps of an ISO 27001 project from inception to certification;Explains each element of the ISO 27001 project in simple, non-technical language; andIs ideal for anyone tackling ISO 27001 implementation for the first time.To be resilient against cyber attacks, organisations must do more than just erect digital defences; a significant percentage of successful attacks originate in the physical world or are aided and exacerbated by environmental vulnerabilities. Effective cyber security therefore requires a comprehensive, systematic and robust ISMS (information security management system), with boards, customers and regulators all seeking assurance that information risks have been identified and are being managed.Successfully implement ISO 27001 with this must-have guide.

9 特價1819
立即代訂
下次再買

Coding with ChatGPT and Other LLMs

Packt 出版
2024/11/11 出版

Leverage LLM (large language models) for developing unmatched coding skills, solving complex problems faster, and implementing AI responsiblyKey Features: - Understand the strengths and weaknesses of LLM-powered software for enhancing performance while minimizing potential issues- Grasp the ethical considerations, biases, and legal aspects of LLM-generated code for responsible AI usage- Boost your coding speed and improve quality with IDE integration- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Keeping up with the AI revolution and its application in coding can be challenging, but with guidance from AI and ML expert Dr. Vincent Hall-who holds a PhD in machine learning and has extensive experience in licensed software development-this book helps both new and experienced coders to quickly adopt best practices and stay relevant in the field.You'll learn how to use LLMs such as ChatGPT and Gemini to produce efficient, explainable, and shareable code and discover techniques to maximize the potential of LLMs. The book focuses on integrated development environments (IDEs) and provides tips to avoid pitfalls, such as bias and unexplainable code, to accelerate your coding speed. You'll master advanced coding applications with LLMs, including refactoring, debugging, and optimization, while examining ethical considerations, biases, and legal implications. You'll also use cutting-edge tools for code generation, architecting, description, and testing to avoid legal hassles while advancing your career.By the end of this book, you'll be well-prepared for future innovations in AI-driven software development, with the ability to anticipate emerging LLM technologies and generate ideas that shape the future of development.What You Will Learn: - Utilize LLMs for advanced coding tasks, such as refactoring and optimization- Understand how IDEs and LLM tools help coding productivity- Master advanced debugging to resolve complex coding issues- Identify and avoid common pitfalls in LLM-generated code- Explore advanced strategies for code generation, testing, and description- Develop practical skills to advance your coding career with LLMsWho this book is for: This book is for experienced coders and new developers aiming to master LLMs, data scientists and machine learning engineers looking for advanced techniques for coding with LLMs, and AI enthusiasts exploring ethical and legal implications. Tech professionals will find practical insights for innovation and career growth in this book, while AI consultants and tech hobbyists will discover new methods for training and personal projects.Table of Contents- What is ChatGPT and What are LLMs?- Unleashing the Power of LLMs for Coding: A Paradigm Shift- Code Refactoring, Debugging, and Optimization: A Practical Guide- Demystifying Generated Code for Readability- Addressing Bias and Ethical Concerns in LLM-Generated Code- Navigating the Legal Landscape of LLM-Generated Code- Security Considerations and Measures- Limitations of Coding with LLMs- Cultivating Collaboration in LLM-Enhanced Coding- Expanding the LLM Toolkit for Coders: Beyond LLMs- Helping Others and Maximizing Your Career with LLMs- The Future of LLMs in Software Development

9 特價1904
立即代訂
下次再買

Homomorphic Encryption for Data Science (He4ds)

Allon,Adir  著
Springer 出版
2024/11/11 出版
9 特價3338
立即代訂
下次再買

Exploring Web Components

2024/11/11 出版

Learn how to create reusable components to build modern Web user interfaces with standard technologies Key Features Learn how standard Web technologies allows you to build reusable UI components. Learn how to protect the look and the internal behavior of your components.Learn how to use Web Components in React, Angular, and Vue projects. Learn how to use third-party libraries and tools to simplify the process of building your components.Description The design of Web user interfaces has been growing significantly in recent times thanks to libraries like React, Angular, Vue. They allow you to create awesome UI components, but have a great drawback: their components are not interoperable.Web Components enable you to overcome this drawback by using a set of standard technologies.The book drives you in the exploration of these technologies with a practical approach. It describes how to create Custom Elements; how to protect their internal behavior by leveraging the Shadow DOM; how to simplify the UI definition through HTML templates.Also, you will discover how to distribute and use your Web Components and how to leverage libraries and tools to develop them.Throughout the book, you will carry out a Web Component project that will provide you with practical experience in using those technologies. What will you learn Use Custom Elements technology to define your HTML elements.Use Shadow DOM to protect the inner behavior of your UI components.Work with HTML templates to simplify and enhance the way you define the UI of your components.Reuse your Web Components in applications built with Vanilla JavaScript, React, Angular, and Vue.Who this book is forThis book is for frontend Web developers who want to leverage standard technologies to build reusable UI components. Basic knowledge of JavaScript, HTML, and CSS is required. Table of Contents 1. Getting Started with Web Components2. Extending HTML Elements3. Creating Custom Web Components4. Managing Properties and Attributes5. Handling Events6. Using the Shadow DOM7. Using HTML Templates8. Distributing and Extending Web Components9. Web Components and Other UI Frameworks10. Tools for Web Components Development About the Author Andrea Chiarelli is a software engineer and technical author with more than 20 years of experience in the software development industry. Throughout his career, he used several programming languages and technologies for the projects he was involved in. Lately, he is focusing on the JavaScript ecosystem both on the server and on the client-side.He has contributed to many online and offline magazines and authored a few books.Currently, he is working at Auth0 as an R&D Content Engineer. Your Blog links: https: //andreachiarelli.it/ Your LinkedIn Profile: https: //www.linkedin.com/in/andreachiarelli/

9 特價966
立即代訂
下次再買

Smart Contract Development with Solidity and Ethereum

Akhil,Mittal  著
2024/11/11 出版

Create, develop and deploy a Smart Contract with ease Key Features Familiarize yourself with Blockchain terminology and its conceptsUnderstand and implement the Cryptography basic principlesUnderstand the life cycle of an Ethereum Transaction Explore and work with Dapps on EthereumA practical guide that will teach you to create and deploy Smart Contracts with Solidity DescriptionThe book covers the fundamentals of Blockchain in detail and shows how to create a Smart Contract with ease. This book is both for novices and advanced readers who want to revisit the Smart Contract development process. The book starts by introduces Blockchain, its terminology, its workflow, and cryptographic principles. You will get familiar with the basics of Ethereum and some Distributed apps available on Ethereum. Furthermore, you will learn to set-up Ethereum Blockchain on Azure. Then you will learn how to create, develop, and deploy a smart contract on Ethereum. Towards the end, you will understand what Blockchain uses and advantages in the real-world scenario. What will you learnGet familiar with the basics of Blockchain and BitcoinSetup a development environment for programming Smart ContractsLearn how to set up an Ethereum Blockchain on AzureUnderstand the basics of Solidity, an object-oriented programming language for writing smart contractsLearn how to test and deploy a smart contractWho this book is forThis book is for Developers, Architects, and Software/Technology Enthusiasts who are interested in Blockchain, Ethereum, and Smart Contracts. It is also for Developers who want to build a Blockchain-based DApps on Ethereum Network. It is for everyone who is learning Solidity and is looking to create and integrate Blockchain into their project.Table of Contents Section 1: What is Blockchain and how does it work? 1. Blockchain - The Concept2. Blockchain - Cryptographic PrinciplesSection 2: Ethereum and DAAPS 1. Distributed Applications 2. Setting up Ethereum Blockchain on AzureSection 3: Smart Contracts Development 1. Setting up an Environment for Smart Contracts Development2. Programming Smart ContractsSection 4: Blockchain in Real World 1. Blockchain-Offerings and Usages About the Author Akhil Mittal lives in Noida, India. He is two times Microsoft MVP (Most Valuable Professional) firstly awarded in 2016 continued in 2017 in Visual Studio and Technologies category, C# Corner MVP since 2013, Code Project MVP since 2014, a blogger, author and likes to write/read technical articles, blogs, and books. Akhil actively contributes his technical articles on CodeTeddy (www.codeteddy.com)He works as a Sr. Consultant with Magic EdTech (www.magicedtech.com) which is recognized as a global leader in delivering end to end learning solutions.He has an experience of more than 12 years in developing, designing, architecting enterprises level applications primarily in Microsoft Technologies. He has diverse experience in working on cutting edge technologies that include Microsoft Stack, AI, Machine Learning, Blockchain and Cloud computing. Akhil is an MCP (Microsoft Certified Professional) in Web Applications and Dot Net Framework.

9 特價695
立即代訂
下次再買

Let's Talk Podcasting

Let 出版
2024/11/09 出版

Want to create a successful podcast? Here's how to do it right. In Let's Talk Podcasting, seasoned podcast producer Amanda Cupido gives you the inside scoop on this burgeoning industry's biggest players and- more importantly-how you can join them.Leading with a solid foundation of podcasting's history and significance in our increasingly content-hungry world, she provides an invaluable insider's perspective on what makes top-rated podcasts so successful, where the medium is headed in the future, and everything you need to start your own podcast today. With sharp wit and plenty of illuminating anecdotes from her own foray into podcasting professionally, Cupido has written a book that will have you ready to hit record in no time.- NEW EDITION UPDATED WITH THE LATEST INFORMATION AND TRENDS: Get ready for fresh takes on where the industry is headed, six new chapters and a foreword by Erika Casupanan, winner of the reality competition Survivor and host of the podcast, Happy to See Me.- A ONE-STOP RESOURCE FOR CURRENT AND ASPIRING PODCASTERS: From covering its history, to laying out the current scene, to predicting what's next, Cupido tells readers everything they need to know to become podcasting experts themselves. Her practical and thoughtful advice on the technical aspects of podcasting make it accessible to aspiring podcasters at any level.- LEARN ABOUT MONETIZATION: Cupido's new book not only ensures that readers will be able to start their own podcasts with ease, but also emphasizes that podcasting can be a career. She covers how podcasts are monetized and gives helpful tips on how to create/sell ads for your own.- GET AN INSIDER'S PERSPECTIVE: Cupido paints a picture of the current podcasting landscape with an insightful, witty insider's perspective. Whether she's sharing her knowledge of podcast heavyweights or recounting the steps she took to produce her own award-winning podcasts, Cupido does it with the kind of strong, authentic voice you would expect from a seasoned audio storyteller.

9 特價628
立即代訂
下次再買

Enigma Myth Deciphered

Marek,Grajek  著
Springer 出版
2024/11/09 出版

This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma. The author uses his experience as a cryptologist to fill in gaps in the sources or to correct misguided interpretations, also adding the passion of a journalist, drawing a vivid picture of the characters and the story. As a Pole, he presents this story through the lens of the fate of the Polish mathematicians who were the first to break the cipher as early as 1932 and laid the foundations for the subsequent Allied success. The book's coverage ranges from the mathematical foundations of codebreaking, through the complex fates of the people and organisations involved in the attacks on the Enigma ciphers, the impact of decrypts on the fate of the major campaigns of the Second World War, to the role that wartime cryptology and codebreakers played in the birth of digital civilisation. The Polish mathematicians' story is presented in the full context of the struggle with the cipher, including the complex interplay between codebreakers, military commanders and politicians of the UK, US, Poland, France, and the Third Reich. By looking at events through the eyes of a cryptologist rather than solely as a historian, the reader is given a glimpse into the backstage of the cryptologic workshop; a better understanding of the scale and nature of the challenges codebreakers faced; and insights into their responses to those challenges, as well as the emotions, dilemmas, disappointments, and triumphs involved.

9 特價2384
立即代訂
下次再買

Wireless LAN Security in a SOHO Environment

Grin Verlag 出版
2024/11/07 出版

Bachelor Thesis from the year 2006 in the subject Computer Science - Internet, New Technologies, grade: 1,7, University of Wales, North East Wales Institute, Wrexham, Gro?britannien (University of Wales, North East Wales Institute, Wrexham, Gro?britannien), language: English, abstract: This paper addresses the theory and reality of Wi-Fi security. It provides an overview of security mechanisms and explains how security works in wireless networks. The most important security protocols that are relevant for small office or home office environments are looked upon in more detail. The security of a real-world wireless network is being tested with freely available tools and popular attacking methods. It is demonstrated that old security protocols can no longer be seen as being secure at all. To create a holistic view the idea of Wi-Fi security is then expanded to include the physical level. A series of experiments provides insight on how to make a network more secure with materials and tools available in every household. A WLAN that is nearly unreachable outside the perimeter does not attract any potential hackers. The paper concludes with recommendations on where to place your access point and what can be done to shield it.

9 特價2551
立即代訂
下次再買

Segment Routing in MPLS Networks

Packt 出版
2024/11/07 出版

Unlock the power of segment routing (SR-MPLS) and fast reroute (FRR) techniques through immersive hands-on labs to revolutionize your understanding and implementation of next-gen MPLS protocolKey Features: - Carry out practical labs to thoroughly grasp and execute MPLS, SR-MPLS, and FRR techniques- Master SR-MPLS and LDP interoperability for seamless integration and efficient network operation- Implement TI-LFA FRR methods for seamless SR-MPLS deployment in production- Purchase of the print or Kindle book includes a free PDF eBookBook Description: In this book, you will learn about segment routing (SR), a cornerstone of modern networking, and topology-independent loop-free alternate (TI-LFA), with hands-on labs to hit the ground running. Written by a key contributor to global segment routing multiprotocol label switching (SR-MPLS) network designs, this book makes learning SR-MPLS both accessible and insightful.The book offers an extensive learning path, taking you from a traditional MPLS network using the label distribution protocol (LDP) to a modern SR-MPLS network using SR, and provides a holistic view of their interworking. You'll also explore TI-LFA fast reroute protection scenarios, and find out how SR-MPLS strengthens network reliability with its source routing paradigm. Using intermediate system-to-intermediate system (IS-IS) as the foundational link-state routing protocol, the chapters ensure that you get a clear understanding of both SR and IS-IS. Following a consistent network topology throughout, this book enables smooth transitions between scenarios, helping you master the technical concepts without distraction.By the end of this book, you'll have a solid grasp of MPLS, SR-MPLS, and TI-LFA fast reroute techniques, ready to tackle real-world networking challenges with confidence. What You Will Learn: - Gain a complete understanding of MPLS and its role in network infrastructures- Develop practical skills to implement SR-MPLS using Cisco IOS-XRv9k and real-life use cases- Acquire hands-on experience with MPLS networks using the IS-IS and LDP protocols- Orchestrate the gradual transition from traditional MPLS to SR-MPLS networks and manage their interworking- Master fast reroute techniques in SR-MPLS networks, including TI-LFA, for efficient traffic rerouting- Implement path protection methods to ensure network resilience and stabilityWho this book is for: This book is for MPLS professionals and network engineers looking to deepen their knowledge in SR and TI-LFA. A basic understanding of MPLS networks is a prerequisite, but worry not-the book also covers foundational MPLS concepts, ensuring network enthusiasts can follow along without any problem. This book is specifically designed for network engineering, operations, and design professionals, covering advanced techniques such as TI-LFA for path protection, empowering you to evolve MPLS networks with SR-MPLS seamlessly.Table of ContentsIntroduction to Multiprotocol Label Switching (MPLS)Lab 1 - Getting Started with LDP-Based MPLS NetworkLab 2 - Introducing Segment Routing MPLS (SR-MPLS)Lab 3 - SR-LDP InterworkingLab 4 - Introducing TI-LFA (Topology Independent - Loop-Free Alternate)Lab 5 - Zero-Segment FRRLab 6 - Single-Segment FRRLab 7 - Double-Segment FRRLab 8 - Microloop AvoidanceLab 9 - TI-LFA Node ProtectionLab 10 - TI-LFA Local SRLG-Disjoint ProtectionLab 11 - TI-LFA Global Weighted SRLG ProtectionLab 12 - TI-LFA Node + SRLG ProtectionLab 13 - TI-LFA Tiebreaker

9 特價1904
立即代訂
下次再買

Machine Learning for Spectrum Sharing

Now Publishers 出版
2024/11/07 出版

The 5th generation (5G) of wireless systems is being deployed with the aim to provide many sets of wireless communication services, such as low data rates for a massive amount of devices, broadband, low latency, and industrial wireless access. Such an aim is even more complex in the next generation wireless systems (6G) where wireless connectivity is expected to serve any connected intelligent unit, such as software robots and humans interacting in the metaverse, autonomous vehicles, drones, trains, or smart sensors monitoring cities, buildings, and the environment. As the wireless devices will be orders of magnitude denser than in 5G cellular systems, and due to the complex quality of service requirements, the access to the wireless spectrum will have to be appropriately shared to avoid congestion, poor quality of service, or unsatisfactory communication delays. Spectrum sharing methods have been the objective of intense study through model-based approaches, such as optimization or game theories. However, these methods may fail when facing the complexity of the communication environments in 5G, 6G, and beyond.Recently, there has been significant interest in the application and development of data-driven methods, namely machine learning methods, to handle the complex operation of spectrum sharing. In this monograph, a complete overview of the state-of-the-art of machine learning for spectrum sharing is provided. First, the authors map the most prominent methods that are encountered in spectrum sharing. Then, it is shown how these machine learning methods are applied to the numerous dimensions and sub-problems of spectrum sharing, such as spectrum sensing, spectrum allocation, spectrum access, and spectrum handoff. Finally, several open questions and future trends are highlighted.

9 特價4188
立即代訂
下次再買

Cisco Catalyst Sd-WAN

Cisco Press 出版
2024/11/07 出版

Unleash the power of Cisco SD-WAN with this comprehensive guide to design, deployment, and security. Cisco Catalyst SD-WAN: Design, Deploy, and Secure Your WAN is your definitive guide to mastering Cisco's Software-Defined Wide Area Networking. This comprehensive resource equips you with the knowledge and skills to optimize performance and enhance security for your organization's network. Whether you're an IT professional, network engineer, or system administrator, this completely revised edition provides the essential tools and knowledge you need to excel in today's demanding networking landscape. With insights from four leading Cisco technology experts, this book also helps you prepare for the CCNP Enterprise Implementing Cisco SD-WAN Solutions ENSDWI 300-415 exam. Covering all of the exam topics, this is the only self-study resource approved by Cisco. It provides a proven test-preparation routine to help you pass the ENSDWI 300-415 exam on your first attempt. Exam preparation features include: Chapter-ending review questions to reinforce your learning The powerful Pearson Test Prep Practice Test software with exam-realistic questions and detailed performance reports An online Flash Cards application to help you drill on Key Terms by chapter Key Features: Architectural Mastery: Understand the key components and benefits of Cisco SD-WAN Efficient Design and Migration: Learn the steps to transition your network smoothly to Cisco Catalyst SD-WAN Policy Implementation: Gain detailed insights into SD-WAN policies and their application Advanced Security: Discover techniques to safeguard your network effectively Up-to-date Content: Includes new chapters on Cloud OnRamp, monitoring, and troubleshooting Content Update Program: This fully updated second edition includes the latest topics and additional information covering changes to the latest CCNP Enterprise Implementing Cisco SD-WAN Solutions ENSDWI 300-415 exam. Visit ciscopress.com for information on annual digital updates for this book that align to Cisco exam blueprint version changes. This extensively updated new edition contains updated policy chapters to include new technologies, such as: Enhanced App Aware Routing Coverage of configuration and policy groups Completely updated security content including segmentation New chapters on Cloud OnRamp and monitoring and troubleshooting Companion Website: The companion website contains the Pearson Test Prep practice test software with two full exams for the CCNP Enterprise ENSDWI 300-415 exam and Key Terms flash cards.

9 特價3384
貨到通知
下次再買

Google JAX Cookbook

Zephyr,Quent  著
Gitforgits 出版
2024/11/06 出版

This is the practical, solution-oriented book for every data scientists, machine learning engineers, and AI engineers to utilize the most of Google JAX for efficient and advanced machine learning. It covers essential tasks, troubleshooting scenarios, and optimization techniques to address common challenges encountered while working with JAX across machine learning and numerical computing projects.The book starts with the move from NumPy to JAX. It introduces the best ways to speed up computations, handle data types, generate random numbers, and perform in-place operations. It then shows you how to use profiling techniques to monitor computation time and device memory, helping you to optimize training and performance. The debugging section provides clear and effective strategies for resolving common runtime issues, including shape mismatches, NaNs, and control flow errors. The book goes on to show you how to master Pytrees for data manipulation, integrate external functions through the Foreign Function Interface (FFI), and utilize advanced serialization and type promotion techniques for stable computations.If you want to optimize training processes, this book has you covered. It includes recipes for efficient data loading, building custom neural networks, implementing mixed precision, and tracking experiments with Penzai. You'll learn how to visualize model performance and monitor metrics to assess training progress effectively. The recipes in this book tackle real-world scenarios and give users the power to fix issues and fine-tune models quickly.Key LearningsGet your calculations done faster by moving from NumPy to JAX's optimized framework.Make your training pipelines more efficient by profiling how long things take and how much memory they use.Use debugging techniques to fix runtime issues like shape mismatches and numerical instability.Get to grips with Pytrees for managing complex, nested data structures across various machine learning tasks.Use JAX's Foreign Function Interface (FFI) to bring in external functions and give your computational capabilities a boost.Take advantage of mixed-precision training to speed up neural network computations without sacrificing model accuracy.Keep your experiments on track with Penzai. This lets you reproduce results and monitor key metrics.Create your own neural networks and optimizers directly in JAX so you have full control of the architecture.Use serialization techniques to save, load, and transfer models and training checkpoints efficiently.Table of ContentTransition NumPy to JAXProfiling Computation and Device MemoryDebugging Runtime Values and ErrorsMastering Pytrees for Data StructuresExporting and SerializationType Promotion Semantics and Mixed PrecisionIntegrating Foreign Functions (FFI)Training Neural Networks with JAX

9 特價2205
立即代訂
下次再買

Smart Home and Industrial IoT Devices

2024/11/06 出版

Smart Home and Industrial IoT Devices: Critical Perspectives on Cyber Threats, Frameworks and Protocols provides an in-depth examination of the Internet of Things (IoT) and its profound impact on smart homes and industrial systems. The book begins by exploring the significance of IoT in smart homes, followed by an analysis of emerging cyber threats targeting smart homes and cyber-physical systems. It presents AI and machine learning-based frameworks for monitoring water quality and managing irrigation in agriculture, highlighting their role in IoT ecosystems. The text also discusses a framework to mitigate cyber-attacks on robotic systems and introduces a multinomial naive Bayesian classifier for analyzing smart IoT devices. Dataflow analysis and modeling experiments are detailed, along with a comparison of IoT communication protocols using anomaly detection and security assessment. The book concludes with a discussion on efficient, lightweight intrusion detection systems and a unique taxonomy for IoT frameworks. This book is ideal for students, researchers, and professionals seeking to understand and secure IoT environments.

9 特價2980
立即代訂
下次再買

Elliptic Curve Cryptography for Developers

2024/11/06 出版

Make your public key protocols smaller and more secure with this accessible guide to Elliptic Curve Cryptography. Elliptic Curve Cryptography for Developers introduces the mathematics of elliptic curves--a powerful alternative to the prime number-based RSA encryption standard. You'll learn to deliver zero-knowledge proofs and aggregated multi-signatures that are not even possible with RSA mathematics. All you need is the basics of calculus you learned in high school. Elliptic Curve Cryptography for Developers includes: - Clear, well-illustrated introductions to key ECC concepts - Implementing efficient digital signature algorithms - State of the art zero-knowledge proofs - Blockchain applications with ECC-backed security The book gradually introduces the concepts and subroutines you'll need to master with diagrams, flow charts, and accessible language. Each chapter builds on what you've already learned, with step-by-step guidance until you're ready to write embedded systems code with advanced mathematical algorithms. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology The Elliptic Curve Cryptography (ECC) protocol secures everything from credit card transactions to the blockchain. With a little C code, high school calculus, and the techniques in this book, you can implement ECC cryptographic protocols that are smaller and more secure than the RSA-based systems in common use today. About the book Elliptic Curve Cryptography for Developers teaches you how ECC protocols work and how to implement them seamlessly in C code. Unlike academic cryptography books, this practical guide sticks to the minimum math and theory you need to get the job done. Author Mike Rosing illustrates each concept with clear graphics, detailed code, and hands-on exercises. As you go, you'll practice what you learn by building two encryption systems for a blockchain application. What's inside - Efficient digital signature algorithms - Zero-knowledge proofs - ECC security for blockchain applications About the reader Readers need to understand basic calculus. Examples in C. About the author Michael Rosing's career as a scientist, hardware engineer, and software developer includes high-energy physics, telephone switch engineering, and developing vision devices for the blind. The technical editor on this book was Mark Bissen. Table of Contents 1 Pairings over elliptic curves in cryptography Part 1 2 Description of finite field mathematics 3 Explaining the core of elliptic curve mathematics 4 Key exchange using elliptic curves 5 Prime field elliptic curve digital signatures explained 6 Finding good cryptographic elliptic curves Part 2 7 Description of finite field polynomial math 8 Multiplication of polynomials explained 9 Computing powers of polynomials 10 Description of polynomial division using Euclid's algorithm 11 Creating irreducible polynomials 12 Taking square roots of polynomials Part 3 13 Finite field extension curves described 14 Finding low embedding degree elliptic curves 15 General rules of elliptic curve pairing explained 16 Weil pairing defined 17 Tate pairing defined 18 Exploring BLS multi-signatures 19 Proving knowledge and keeping secrets: Zero knowledge using pairings Appendix A Code and tools Appendix B Hilbert class polynomials Appendix C Variables list

9 特價2753
立即代訂
下次再買

Overlay-Integrated Heterogeneous Wireless Networks

Sajal,Saha  著
2024/11/05 出版

Mobile computing for Personal Communication Service (PCS) enables users with reliable, bi-directional internet access anytime, anywhere. Mobile IP, as a network layer protocol, addresses mobile computing needs. Terminal mobility and service area changes make efficient IP mobility crucial in minimizing packet loss and handover latency in heterogeneous networks. This work presents an in-depth analysis of mobile IP protocols and evaluates the GTP protocol's performance in a customized heterogeneous network, focusing on handoff. We propose an overlay-based architecture for heterogeneous networks, including 2G/2.5G/3G/WLAN/WiMax, and a crossover switch to manage vertical handoff and interlayer mobility. Simulations using NS-2 show that the proposed GWON (Global Wireless Overlay Network) architecture enables vertical handoff between networks with minimal delay and no call drops. The results demonstrate improved handoff delay compared to existing protocols.

9 特價3226
立即代訂
下次再買

Optimizing Cloud Networks by Means of Topology

Ali,Zayeri  著
Scholars' Press 出版
2024/11/05 出版

Cloud issues and cloud storage are becoming more and more important today than ever before. In the cloud, it is very difficult to decide what data needs security or what data does not require security, but the level of security required for the data is classified according to the specifications and Data features will be easy. On the cloud server, all data is stored in one of two ways: encrypting the data and storing it in the cloud servers, and storing data on the cloud servers without encryption, both of which can Encounter confidentiality issues because data has different values and properties that need to be specified before sending to cloud servers. In a cloud environment, user data on remote servers that are not physically recognized by customers and stored over the Internet must have unique confidentiality levels. In this research, a cloud classification data model is proposed to solve the confidentiality issues in cloud computing environment. Data categorization and security issues are performed according to their level of sensitivity. One of the most important parameters in improving the quality of the proposed model is time management.

9 特價3046
立即代訂
下次再買

Transforming IoT Connectivity

Jiliang,Wang  著
2024/11/05 出版

As the Internet of Things (IoT) rapidly evolves, it fosters numerous innovative applications that connect low-data-rate, low-power devices. Traditional wireless technologies struggle to meet these connectivity needs, leading to the exploration of Low-Power Wide Area Networks (LPWAN) for long-distance communication. This book addresses critical challenges in LPWAN technologies for large-scale deployments, including transmission conflicts, weak signals, and interference from diverse protocols. We present a novel collision decoding mechanism that enhances network throughput, a weak signal enhancement mechanism for improved signal quality in complex environments, and a wide-area heterogeneous interconnection technology for effective communication across different technologies. Our large-scale deployment, connecting thousands of smart city devices, validates the effectiveness of these solutions, providing a vital resource for researchers and practitioners in IoT connectivity.

9 特價3088
立即代訂
下次再買

Cryptocurrencies - Financial Technologies of the Future

Intechopen 出版
2024/11/05 出版

Money is undoubtedly the fundamental element of the economy, and its history reflects the evolution of financial markets. Currently, we are witnessing significant technological advancements in payment methods, highlighting the potential benefits of introducing new means of economic exchange. Cryptocurrencies may emerge as a prominent form of payment in the future. Cryptocurrencies are an innovative and technologically advanced alternative to a fully globalized future. They represent a potential solution for processing payments across geographical borders. Additionally, if cryptocurrencies are effectively regulated through current adjustments, they will be able to help future generations navigate the complexities of financial transactions. Cryptocurrencies perform the same functions as traditional money, possessing attributes such as durability, divisibility, and originality. With social acceptance, they could become a legitimate means of exchange. Over the last decade or so, cryptocurrencies have gained popularity, and their importance in financial markets continues to grow. Their innovative nature has the potential to drive substantial changes and significantly impact the functioning of the global financial sector in the future. Cryptocurrencies - Financial Technologies of the Future provides knowledge, recommendations, and practical solutions to new challenges within the contemporary processes of globalization and international trade thanks to cryptocurrencies

9 特價5805
立即代訂
下次再買

RLO by Classification Algorithms

2024/11/05 出版

Learning styles has gained widespread recognition in education theory and classroom management strategy. Individual learning styles depend on cognitive, emotional and environmental factors, as well as one's prior experience. This research work comprises defining method which uses questionnaires to determine the student's learning style and then adapt their behavior according to the learning styles. This research work uses primarily, personality trait test (PTT) is used to predict the learning behavior of the student. After that empirical relationship between the Kolb's learning style and learning computer programming skills through classification algorithms was analyzed. The performance of the research work has been evaluated through experimental results.

9 特價3680
立即代訂
下次再買

Open Source Intelligence (Osint) - A Practical Introduction

Varin,Khera  著
2024/11/05 出版

This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking techniques, privacy best practices for OSINT researchers, and practical examples of OSINT investigations.

9 特價3578
立即代訂
下次再買

Evaluation of the Comparison Between Digital Marketing Strategies

2024/11/05 出版

This evaluation examines the differences in digital marketing strategies employed by local and international companies. It focuses on how each approach influences consumer engagement, brand visibility, and overall marketing effectiveness. By analyzing various case studies and metrics, the study aims to identify key strengths and weaknesses of both strategies, offering insights into best practices for optimizing digital marketing efforts. The findings will provide valuable recommendations for businesses seeking to enhance their digital presence in a competitive marketplace.

9 特價3326
立即代訂
下次再買

IT Governance

Alan,Calder  著
Itgp 出版
2024/11/05 出版

Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.g. the GDPR (General Data Protection Regulation); andReview key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance.Fully updated to align with ISO 27001/27002:2022IT Governance - An international guide to data security and ISO 27001/ISO 27002, Eighth edition provides: Expert information security management and governance guidance based on international best practice;Guidance on how to protect and enhance your organisation with an ISO 27001:2022-compliant ISMS; andDiscussion around the changes to international legislation, including ISO 27001:2022 and ISO 27002:2022.As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.

9 特價3483
立即代訂
下次再買

Applications and Techniques in Information Security

Springer 出版
2024/11/04 出版

This book constitutes the refereed proceedings of the 14th International Conference, on Applications and Techniques in Information Security, ATIS 2024, held in Tamil Nadu, India, November 22-24, 2024. The 24 full papers presented were carefully reviewed and selected from 149 submissions. The conference focuses on Advancing Quantum Computing and Cryptography; AI-Driven Cybersecurity: The Role of Machine Learning; Advancing Cybersecurity with Deep Learning Techniques; and Securing Connected Systems: IoT, Cloud, and Web Security Strategies.

9 特價4054
立即代訂
下次再買

Information Technology for Peace and Security

Springer Vieweg 出版
2024/11/04 出版

Technological and scientific progress, especially the rapid development in information technology (IT) and artificial intelligence (AI), plays a crucial role regarding questions of peace and security. This textbook, extended and updated in its second edition, addresses the significance, potential of IT, as well as the challenges it poses, with regard to peace and security. It introduces the reader to the concepts of peace, conflict, and security research, especially focusing on natural, technical and computer science perspectives. In the following sections, it sheds light on cyber conflicts, war and peace, cyber arms control, cyber attribution, infrastructures, artificial intelligence, as well ICT in peace and conflict.

9 特價3392
貨到通知
下次再買

The Routledge Handbook of Privacy and Social Media

Routledge 出版
2024/11/04 出版

This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors - such as culture, gender, and trust - and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.Chapter 22 and Chapter 30 of this book are freely available as downloadable Open Access PDFs at http: //www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.

9 特價2861
立即代訂
下次再買

Zero to Hero

CRC Press 出版
2024/11/04 出版

Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book stands as a beacon of clarity and practical wisdom. Tailored for novices and those with basic understanding, this resource empowers learners to solidify their cybersecurity foundation. It stands out with its laser focus on real-world applicability, ensuring readers grasp theoretical concepts and can implement them effectively.Key Features of This Guide: Actionable Learning: Dive into engaging exercises, compelling case studies, and practical scenarios that demystify complex cybersecurity concepts Career Development: Gain invaluable insights into crafting a standout resume, navigating job interviews with confidence, and learning strategies for a successful job hunt in the cybersecurity realm Cutting-Edge Knowledge: Stay ahead of the curve with detailed explorations of the latest cybersecurity trends, tools, and technologies that are shaping the future of digital security In-Depth Discussions: From ethical hacking to digital forensics, explore the breadth and depth of the cybersecurity field, ensuring a comprehensive understanding of various career paths Progressive Skill-Building: Embark on a structured learning journey, from foundational concepts to advanced techniques, tailored to foster a deep, actionable understanding of cybersecurity Zero to Hero: Your Guide to a Career in Cybersecurity is your launchpad into the heart of the industry. Perfect for students, career changers, and IT professionals, this book provides the essential knowledge and skills to secure a rewarding career in this critical field. Begin your journey from novice to expert in cybersecurity today!

9 特價1669
立即代訂
下次再買

Surviving a Cyberattack

2024/11/04 出版

Surviving a Cyberattack: Securing Social Media and Protecting Your Home is a roadmap to protecting your home against cybercrime. This comprehensive guide addresses the ever-growing challenges users face from the potential of cybercrime in the technology-connected world. It explores various online risks, from social media scams and data breaches to fraud. Recognizing these threats is crucial for protecting yourself, your loved ones, and even your small business. This hands-on reference equips you with the knowledge and tools to navigate the online landscape safely. It covers essential topics like securing your router and social media accounts, protecting personal information, and mitigating risks for children and vulnerable adults. Additionally, it offers valuable insights on online shopping safety, responsible technology disposal, and surviving a cyberattack. FEATURES: Explains how to protect children, foster responsible online habits, manage their digital access, and keep them safe from harm.Includes sections on caring for vulnerable family members, protecting them from online predators, managing their digital accounts, and how to handle sensitive topics like digital estate planning.Provides practical checklists for social media security settings, router configuration, and data backup procedures.Discusses how to survive a cyberattack including data backup strategies, reporting procedures, and steps to take after a security breach.

9 特價1260
立即代訂
下次再買

Weka Practice

Jose,P  著
2024/11/03 出版

Weka is a strong yet approachable machine learning and data mining tool. Data mining and big data are hot topics right now. Rather than diving into intricate mathematical theories or sophisticated algorithmic details, this course emphasizes hands-on experience with Weka and the practical applications of data mining tools and techniques. In addition to performing text classification and working with datasets with millions of instances, students will also investigate clustering, association rules, and other topics.

9 特價2030
立即代訂
下次再買

Cyber Certainty

Daniel,Tobok  著
2024/11/03 出版

In today's digital age, safeguarding your corporation's digital assets is not just a necessity; it's an imperative. Daniel Tobok presents an enlightening guide to cyber security, meticulously designed to demystify the complex world of cyber protection for business leaders. This guide is your key to understanding the crucial dialogue between business executives and cybersecurity experts.Crafted with the business leader in mind, this guide transcends the usual technical jargon, making it accessible at any level of corporate leadership, especially for those in senior positions. Through the use of engaging case studies, it offers a panoramic view of the lessons learned by corporations in the cyber battlefield, providing invaluable insights into navigating the digital threats that loom over businesses today.Whether you're a seasoned executive or stepping into leadership, this book is an indispensable resource, empowering you to take charge of your company's cyber security strategy. Embrace the opportunity to fortify your digital defenses and ensure the longevity and success of your business in the digital realm.

9 特價943
立即代訂
下次再買

Advances in Quantitative Ethnography

Springer 出版
2024/11/03 出版

This two-volume set CCIS 2278-2279 constitutes the refereed proceedings of the 6th International Conference on Advances in Quantitative Ethnography, ICQE 2024, held in Philadelphia, PA, USA, during November 3-7, 2024. The 31 full papers and 10 short papers included in this book were carefully reviewed and selected from 82 submissions. They are organized in the following topical sections: Theory and Methods; Teaching and Learning; and Cultural Discourse.

9 特價3815
立即代訂
下次再買

Advances in Quantitative Ethnography

Springer 出版
2024/11/03 出版

This two-volume set CCIS 2278-2279 constitutes the refereed proceedings of the 6th International Conference on Advances in Quantitative Ethnography, ICQE 2024, held in Philadelphia, PA, USA, during November 3-7, 2024. The 31 full papers and 10 short papers included in this book were carefully reviewed and selected from 82 submissions. They are organized in the following topical sections: Theory and Methods; Teaching and Learning; and Cultural Discourse.

9 特價3815
立即代訂
下次再買

Zero to Hero

CRC Press 出版
2024/11/01 出版

Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book stands as a beacon of clarity and practical wisdom. Tailored for novices and those with basic understanding, this resource empowers learners to solidify their cybersecurity foundation. It stands out with its laser focus on real-world applicability, ensuring readers grasp theoretical concepts and can implement them effectively.Key Features of This Guide: Actionable Learning: Dive into engaging exercises, compelling case studies, and practical scenarios that demystify complex cybersecurity concepts Career Development: Gain invaluable insights into crafting a standout resume, navigating job interviews with confidence, and learning strategies for a successful job hunt in the cybersecurity realm Cutting-Edge Knowledge: Stay ahead of the curve with detailed explorations of the latest cybersecurity trends, tools, and technologies that are shaping the future of digital security In-Depth Discussions: From ethical hacking to digital forensics, explore the breadth and depth of the cybersecurity field, ensuring a comprehensive understanding of various career paths Progressive Skill-Building: Embark on a structured learning journey, from foundational concepts to advanced techniques, tailored to foster a deep, actionable understanding of cybersecurity Zero to Hero: Your Guide to a Career in Cybersecurity is your launchpad into the heart of the industry. Perfect for students, career changers, and IT professionals, this book provides the essential knowledge and skills to secure a rewarding career in this critical field. Begin your journey from novice to expert in cybersecurity today!

9 特價6678
立即代訂
下次再買

Cyber Warfare, Security and Space Computing

Springer 出版
2024/11/01 出版

This book constitutes selected papers from the Second International Conference on Cyber Warfare, Security and Space Research, SpacSec 2024, held in Jaipur, India, on February 22-23, 2024. The 27 papers presented here were carefully reviewed and selected from 333 submissions. These papers focus on various domains of Cyber warfare and Space computing, including emerging research and applications in the field.

9 特價4436
貨到通知
下次再買

Exploring The Intersection Of Artificial Intelligence And Cyber Defense

2024/11/01 出版

This book explores the groundbreaking role of artificial intelligence in reshaping cybersecurity, offering a thorough foundation in AI concepts and their application to modern threat detection and response. By examining how machine learning algorithms and advanced AI techniques are transforming cyber threat identification and management, it provides a clear view of the power of AI-driven solutions. Through detailed discussions, it illustrates how AI automates critical processes such as incident response, predictive analytics, and behavioral analysis, showcasing the technology's ability to uncover vulnerabilities and defend against sophisticated threats like zero-day exploits.In addition to practical case studies demonstrating AI's integration into current security frameworks, the book addresses essential ethical and privacy considerations, emphasizing the need for a balanced approach in deploying AI for cybersecurity. The final chapters look ahead, exploring the future landscape of AI in cyber defense and examining upcoming trends and challenges. For professionals and enthusiasts alike, this comprehensive guide delivers valuable insights into leveraging AI to build stronger, more resilient cybersecurity systems.

9 特價846
立即代訂
下次再買

Applications of 5G and Beyond in Smart Cities

Ambar,Bajpai  著
CRC Press 出版
2024/11/01 出版

This book explores the potential of 5G technologies and beyond in smart city setups, with the availability of high bandwidths and performance, and low latency. The book starts with an introduction to 5G, along with the challenges, limitations, and research areas in future wireless communication, including the related requirements for transformation of societal paradigms and infrastructure. Applications related to visible light communication, network management in smart cities, the role of 5G in public healthcare, safety, security, and transportation, and existing and planned 6G research frameworks are included.The features of the book include: A broad perspective on 5G communications with a focus on smart cities. Discussion of artificial intelligence in future wireless communication and its applications. A systemic and comprehensive coverage of 6G technologies, challenges, and uses. The role of future wireless communications in safety, health, and transport in smart cities. Case studies of future wireless communication. This book is aimed at researchers and professionals in communications, signal processing, cyber-physical systems, and smart cities.

9 特價2957
立即代訂
下次再買

Cyber Security Using Modern Technologies

Om,Pal  著
CRC Press 出版
2024/11/01 出版

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.

9 特價2861
立即代訂
下次再買

Web3

Ken,Huang  著
2024/10/31 出版

Web3 is a new frontier of internet architecture emphasizing decentralization and user control. This text for MBA students and industry professionals explores key Web3 concepts, starting from foundational principles and moving to advanced topics like blockchain, smart contracts, tokenomics, and DeFi. The book takes a clear, practical approach to demystify the tech behind NFTs and DAOs as well as the complex regulatory landscape. It confronts challenges of blockchain scalability, a barrier to mainstream adoption of this transformative technology, and examines smart contracts and the growing ecosystem leveraging their potential. The book also explains the nuances of tokenomics, a vital element underpinning Web3's new economic model. This book is ideal for readers seeking to stay on top of emerging trends in the digital economy.

9 特價2969
立即代訂
下次再買

Enhancing Your Cloud Security with a CNAPP Solution

Packt 出版
2024/10/30 出版

Implement the entire CNAPP lifecycle from designing, planning, adopting, deploying, and operationalizing to enhance your organization's overall cloud security posture.Key Features: - Master the CNAPP lifecycle from planning to operationalization using real-world practical scenarios.- Dive deep into the features of Microsoft's Defender for Cloud to elevate your organization's security posture.- Explore hands-on examples and implementation techniques from a leading expert in the cybersecurity industryBook Description: Cloud security is a pivotal aspect of modern IT infrastructure, essential for safeguarding critical data and services. This comprehensive book explores Cloud Native Application Protection Platform (CNAPP), guiding you through adopting, deploying, and managing these solutions effectively. Written by Yuri Diogenes, Principal PM at Microsoft, who has been with Defender for Cloud (formerly Azure Security Center) since its inception, this book distills complex concepts into actionable knowledge making it an indispensable resource for Cloud Security professionals.The book begins with a solid foundation detailing the why and how of CNAPP, preparing you for deeper engagement with the subject. As you progress, it delves into practical applications, including using Microsoft Defender for Cloud to enhance your organization's security posture, handle multicloud environments, and integrate governance and continuous improvement practices into your operations.Further, you'll learn how to operationalize your CNAPP framework, emphasizing risk management & attack disruption, leveraging AI to enhance security measures, and integrating Defender for Cloud with Microsoft Security Exposure Management. By the end, you'll be ready to implement and optimize a CNAPP solution in your workplace, ensuring a robust defense against evolving threats.What You Will Learn: - Implement Microsoft Defender for Cloud across diverse IT environments- Harness DevOps security capabilities to tighten cloud operations- Leverage AI tools such as Microsoft Copilot for Security to help remediate security recommendations at scale- Integrate Microsoft Defender for Cloud with other XDR, SIEM (Microsoft Sentinel) and Microsoft Security Exposure Management- Optimize your cloud security posture with continuous improvement practices- Develop effective incident response plans and proactive threat hunting techniquesWho this book is for: This book is aimed at Cloud Security Professionals that work with Cloud Security, Posture Management, or Workload Protection. DevOps Engineers that need to have a better understanding of Cloud Security Tools and SOC Analysts that need to understand how CNAPP can enhance their threat hunting capabilities can also benefit from this book. Basic knowledge of Cloud Computing, including Cloud Providers such as Azure, AWS, and GCP is assumed.Table of Contents- Why CNAPP?- Assessing your Environment's Security Posture- CNAPP Design Considerations- Creating an Adoption Plan- Elevating your Workload's Security Posture- Multicloud- DevOps Security Capabilities- Governance and Continuous Improvement- Proactive Hunting- Implementing Workload Protection- Protecting Compute resources (Servers and Containers)- Protecting Storage and Databases- Protecting APIs- Protecting Service Layer- Incident Response- Leveraging AI to Improve your Security Posture- Extended Security Posture Management (XSPM)

9 特價2115
立即代訂
下次再買

Security and Privacy in Smart Environments

Springer 出版
2024/10/30 出版
9 特價2623
立即代訂
下次再買

Information and Communication Technologies

Springer 出版
2024/10/30 出版

This book constitutes the refereed proceedings of the 12th Ecuadorian Conference on Information and Communication Technologies, TICEC 2024, held in Loja, Ecuador, during October 16-18, 2024. The 24 full papers presented here were carefully reviewed and selected from 74 submissions. They were organized in the following topical sections: Image Processing, Classification, and Segmentation; Artificial Intelligence and Machine Learning Applications; IoT, Embedded Systems, and Applications in Healthcare and Industrial Environments.

9 特價4054
立即代訂
下次再買

Writing for Developers

Piotr,Sarna  著
2024/10/29 出版

Pragmatic methods for writing blogs, articles, and other technical pieces that stand out from the crowd! Do you want to connect with your community, share your state-of-the-art achievements, and help your peers benefit from your hard-fought lessons learned? Do you want to get the kind of attention that expands your career? Master the art of writing engineering blog posts and articles! This comprehensive guide shows you how to create content your fellow developers will love to read and share. Writing for Developers is full of the practical tips, tricks, and techniques you need to translate the ideas floating around your head into content that's clear and compelling, including how to: - Pinpoint topics that make intriguing posts - Apply popular blog post design patterns - Rapidly plan, draft, and optimize blog posts - Make your content clearer and more convincing to technical readers - Tap AI for revision while avoiding misuses and abuses - Increase the impact of all your technical communications Whether you're brand new to writing, or a seasoned hand who wants more attention for your work, Writing for Developers will help ensure your writing resonates with readers. This isn't a generic writing guide--from start to finish, the book is laser-focused on technical topics, writers, and audiences. Authors Piotr Sarna and Cynthia Dunlop combine their differing perspectives as an engineer and professional writer to help you write compelling works. You'll learn through detailed examples, methodical strategies, and a "punk rock DIY attitude!" Foreword by Bryan Cantrill. Afterword by Scott Hanselman. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology A well-crafted technical article can spark a new idea, demystify a technology, expand your perspective, or save you from going down a disastrous path. Even if you don't consider yourself a "good writer," you can make a difference by sharing insights and advancing the community. This practical guide shows you how to create blogs, articles, and other content your fellow developers will want to read and share. About the book Writing for Developers introduces seven popular patterns for modern engineering blogs--such as "The Bug Hunt," "We Rewrote It in X," and "How We Built It"--and helps you match these patterns with your ideas. This book covers the entire writing process, from brainstorming, planning, and revising, to promoting your blog in ways that build reputation and generate further opportunities. What's inside - Rapidly plan, draft, and review your content - Build on popular blog post design patterns - Support your writing with AI - Increase the impact of all your communications About the reader For developers and engineers of all ability levels--even if you're not a native English speaker and never took a writing class in your life. About the author Piotr Sarna is a software engineer and an experienced book and blog author. Cynthia Dunlop has been writing for and with developers for 20+ years. Table of Contents Part 1 1 Why write 2 What to write 3 Captivating readers Part 2 4 Creating your working draft 5 Optimizing your draft 6 Getting feedback 7 Ship it Part 3 8 The "Bug Hunt" pattern 9 The "Rewrote It in X" pattern 10 The "How We Built It" pattern 11 The "Lessons Learned" pattern 12 The "Thoughts on Trends" pattern 13 The "Non-markety Product Perspectives" pattern 14 The "Benchmarks and Test Results" pattern Part 4 15 Getting attention 16 From blog post to conference talk 17 So you want to write a book A Publishing and writing resources B AI uses and abuses

9 特價2294
貨到通知
下次再買

The role of media literacy in the fight against fakes and disinformation in the media space of Uzbekistan

2024/10/28 出版

With the unparalleled development of the internet in the 21st century, the world has effectively become 'one step closer'. News from one corner of the world now reaches the other in mere seconds. Media's influence on modern society's development continues to grow each year, shaping people's social and psychological understanding and evaluation of their environment. The main features of contemporary media are 'creativity and innovation'. However, it has become increasingly common to encounter incorrect and harmful information within the news published in mass media and on official news websites. False, fabricated and misleading information negatively influences the audience's mindset, disrupting relationships between people, undermining existing rules, values, and traditions within society. As a result, fake news, what experts refer to as 'disinformation', has become one of modern journalism's most pressing issues . 'Fake news' is not merely a form of information but has evolved into a 'new phenomenon of the 21st century', requiring both theoretical and practical investigation as a social issue. This book describes the theoretical foundations, philological aspects of media literacy, social impact characteristics of fake and disinformation, and dissemination technologies.

9 特價945
立即代訂
下次再買

Industrial Cybersecurity

Anand,Shinde  著
Cyberauthor 出版
2024/10/28 出版

This book "Industrial Cybersecurity", offers an in-depth exploration of essential strategies for safeguarding industrial operations. It includes insights about: - The Purdue Model for Industrial Control Systems.- IT Operational Technology security in accordance with NIST SP 800-82.- Risk management, cybersecurity architecture, and indispensable security tools.- OT systems, OT cybersecurity architecture, essential security capabilities, tools, and critical infrastructure.This meticulously crafted guide will be an indispensable reference for professionals and organizations protecting critical infrastructure."Industrial Cybersecurity" is ideal for cybersecurity professionals, OT specialists, IT security managers, industrial engineers, and students. It is also a useful asset for security practitioners, policymakers and regulators, consultants and advisors, and academic institutions focused on cybersecurity and industrial engineering.

9 特價1100
立即代訂
下次再買

Information Security Practice and Experience

Zhe,Xia  著
Springer 出版
2024/10/26 出版

This book constitutes the refereed proceedings of the 19th International Conference on Information Security Practice and Experience, ISPEC 2024, held in Wuhan, China, during October 25-27, 2024. The 22 full papers presented in this volume were carefully reviewed and selected from 70 submissions. They cover multiple topics of cyber security and applied cryptography. The main goal of ISPEC 2024 conference was to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

9 特價3577
立即代訂
下次再買

Information Security

Nicky,Mouha  著
Springer 出版
2024/10/25 出版

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.

9 特價3577
立即代訂
下次再買

How AI Will Shape Our Future

2024/10/25 出版

"A fascinating journey into the future of AI, providing a unique perspective that combines technology, economics, geopolitics, and history." - PASCAL BORNET, Technology Influencer, 2 million followers.Written in an accessible style for all audiences, "How AI Will Shape Our Future" anchors readers in the history and evolution of Artificial Intelligence, laying the groundwork for a deeper understanding of its trajectory. This equips readers to engage more thoughtfully with the book's central theme: What should societies expect from AI in the decades ahead?How does AI actually function? What will its impact be on employment and education, both short-term and long-term? How will AI reshape society, the economy, government, culture, and geopolitics? What are the potential utopian and dystopian outcomes, and who will be most affected? What's happening with China and the intensifying AI arms race? Could synthetic biology lead to human-cyborg coexistence, ultimately influencing human evolution? Most critically, what should we demand of our leaders today to prepare for AI's inevitable advancement?These are just some of the provocative questions explored and answered by Pedro Uria-Recio, a former McKinsey consultant and Chief AI Officer who has spent years working with this transformative technology on a global scale.Whether you're a technologist or a homemaker, a businessperson or a student, a voter or a policymaker, or simply curious about humanity's future, "How AI Will Shape Our Future" offers essential insights for navigating the complexities of AI.How AI Will Shape Our Future- Humanity Interlaces with AI: AI is our new mind. Robotics, our new body. How are we becoming a new species at the intersection of carbon and silicon?- AI Gets Exponential: Artificial General Intelligence. Humanoids and cyborgs. Synthetic biology. Quantum computing. Mind emulation. How will they unfold?- AI Authoritarianism Looms: AI will render truth obsolete, freedom redefined, and job scarcity ubiquitous. Can we still shape AI for the benefit of all?- Geopolitics Supercharged: Super Intelligence will be worshiped. China and America will clash over their views on AI. Politics will be centered on species identities.- Humanity's Greatest Epic: From Mythology to Kubrick. From Aristotle to Sam Altman. From Leonardo to Boston Dynamics. From today to Superintelligence.- Stay Ahead with AI: Critical thinking. Adaptability. Entrepreneurship."A seminal work, brilliantly navigating the transformative impact of AI on humanity and the advent of the machine economy, promising a harmonious fusion of technology and societal progress."-Professor Paul J. Morrissey, Professor at Liverpool John Moores University, Feb 15, 2024"I'm left utterly speechless after reading this book! It truly expanded my mind, especially in its contemplation of the future implications of AI."-D. Rob, April 28, 2024"Skillfully weaves together history, analysis, and thought-provoking predictions, challenging readers to confront the ethical and philosophical implications of this transformative technology. Recommend!"-Zahid, June 9, 2024"AI Magnum Opus! What an in-depth and thorough volume on AI. From ancient history to future predictions, political implications, potential impacts, and outcomes, if there is any question you have about AI impact, this book likely touches on it. Vast in its breadth and intelligent insights."-J Palmer, May 20, 2024

9 特價1103
貨到通知
下次再買

API Design

2024/10/25 出版

From Monolithic Applications to Microservices, The Evolution of APIs explores the history, principles, and future of API design, covering topics such as user-centered interfaces, scalability, security, and ethical considerations. With a focus on technical considerations and best practices, this comprehensive guide is essential for developers, designers, and anyone involved in API development and implementation.

9 特價3780
立即代訂
下次再買
頁數22/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing