Writing for Developers
Pragmatic methods for writing blogs, articles, and other technical pieces that stand out from the crowd! Do you want to connect with your community, share your state-of-the-art achievements, and help your peers benefit from your hard-fought lessons learned? Do you want to get the kind of attention that expands your career? Master the art of writing engineering blog posts and articles! This comprehensive guide shows you how to create content your fellow developers will love to read and share. Writing for Developers is full of the practical tips, tricks, and techniques you need to translate the ideas floating around your head into content that's clear and compelling, including how to: - Pinpoint topics that make intriguing posts - Apply popular blog post design patterns - Rapidly plan, draft, and optimize blog posts - Make your content clearer and more convincing to technical readers - Tap AI for revision while avoiding misuses and abuses - Increase the impact of all your technical communications Whether you're brand new to writing, or a seasoned hand who wants more attention for your work, Writing for Developers will help ensure your writing resonates with readers. This isn't a generic writing guide--from start to finish, the book is laser-focused on technical topics, writers, and audiences. Authors Piotr Sarna and Cynthia Dunlop combine their differing perspectives as an engineer and professional writer to help you write compelling works. You'll learn through detailed examples, methodical strategies, and a "punk rock DIY attitude!" Foreword by Bryan Cantrill. Afterword by Scott Hanselman. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology A well-crafted technical article can spark a new idea, demystify a technology, expand your perspective, or save you from going down a disastrous path. Even if you don't consider yourself a "good writer," you can make a difference by sharing insights and advancing the community. This practical guide shows you how to create blogs, articles, and other content your fellow developers will want to read and share. About the book Writing for Developers introduces seven popular patterns for modern engineering blogs--such as "The Bug Hunt," "We Rewrote It in X," and "How We Built It"--and helps you match these patterns with your ideas. This book covers the entire writing process, from brainstorming, planning, and revising, to promoting your blog in ways that build reputation and generate further opportunities. What's inside - Rapidly plan, draft, and review your content - Build on popular blog post design patterns - Support your writing with AI - Increase the impact of all your communications About the reader For developers and engineers of all ability levels--even if you're not a native English speaker and never took a writing class in your life. About the author Piotr Sarna is a software engineer and an experienced book and blog author. Cynthia Dunlop has been writing for and with developers for 20+ years. Table of Contents Part 1 1 Why write 2 What to write 3 Captivating readers Part 2 4 Creating your working draft 5 Optimizing your draft 6 Getting feedback 7 Ship it Part 3 8 The "Bug Hunt" pattern 9 The "Rewrote It in X" pattern 10 The "How We Built It" pattern 11 The "Lessons Learned" pattern 12 The "Thoughts on Trends" pattern 13 The "Non-markety Product Perspectives" pattern 14 The "Benchmarks and Test Results" pattern Part 4 15 Getting attention 16 From blog post to conference talk 17 So you want to write a book A Publishing and writing resources B AI uses and abuses
Industrial Cybersecurity
This book "Industrial Cybersecurity", offers an in-depth exploration of essential strategies for safeguarding industrial operations. It includes insights about: - The Purdue Model for Industrial Control Systems.- IT Operational Technology security in accordance with NIST SP 800-82.- Risk management, cybersecurity architecture, and indispensable security tools.- OT systems, OT cybersecurity architecture, essential security capabilities, tools, and critical infrastructure.This meticulously crafted guide will be an indispensable reference for professionals and organizations protecting critical infrastructure."Industrial Cybersecurity" is ideal for cybersecurity professionals, OT specialists, IT security managers, industrial engineers, and students. It is also a useful asset for security practitioners, policymakers and regulators, consultants and advisors, and academic institutions focused on cybersecurity and industrial engineering.
The role of media literacy in the fight against fakes and disinformation in the media space of Uzbekistan
With the unparalleled development of the internet in the 21st century, the world has effectively become 'one step closer'. News from one corner of the world now reaches the other in mere seconds. Media's influence on modern society's development continues to grow each year, shaping people's social and psychological understanding and evaluation of their environment. The main features of contemporary media are 'creativity and innovation'. However, it has become increasingly common to encounter incorrect and harmful information within the news published in mass media and on official news websites. False, fabricated and misleading information negatively influences the audience's mindset, disrupting relationships between people, undermining existing rules, values, and traditions within society. As a result, fake news, what experts refer to as 'disinformation', has become one of modern journalism's most pressing issues . 'Fake news' is not merely a form of information but has evolved into a 'new phenomenon of the 21st century', requiring both theoretical and practical investigation as a social issue. This book describes the theoretical foundations, philological aspects of media literacy, social impact characteristics of fake and disinformation, and dissemination technologies.
Information Security Practice and Experience
This book constitutes the refereed proceedings of the 19th International Conference on Information Security Practice and Experience, ISPEC 2024, held in Wuhan, China, during October 25-27, 2024. The 22 full papers presented in this volume were carefully reviewed and selected from 70 submissions. They cover multiple topics of cyber security and applied cryptography. The main goal of ISPEC 2024 conference was to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
Information Security
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.
Advances in Bias and Fairness in Information Retrieval
This book constitutes the refereed proceedings of the 5th International Workshop on Algorithmic Bias in Search and Recommendation, BIAS 2024, held in Washington, DC, USA, on July 18, 2024 in hybrid mode. The 7 full papers included in this book were carefully reviewed and selected from 20 submissions. They are grouped into three thematic sessions, each focusing on distinct aspects of bias and fairness in information retrieval.
Information Security
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.
ManusCrypt
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.
Generative AI and Digital Forensics
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as "Digital Forensics". This is where specially trained Digital Forensics Investigators collect and comb through every piece of evidence to determine this.
ManusCrypt
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.
Generative AI and Digital Forensics
A key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as "Digital Forensics". This is where specially trained Digital Forensics Investigators collect and comb through every piece of evidence to determine this.
Mastering LinkedIn
In the digital age, networking and professional growth have transcended traditional boundaries. LinkedIn, the world's largest professional network, has emerged as a critical platform for individuals and businesses alike. This chapter delves into why LinkedIn matters, how it has transformed the professional landscape, and the myriad benefits of having an optimized LinkedIn profile.Professional networking has always been a cornerstone of career development. In the past, networking primarily occurred through face-to-face interactions, industry conferences, and personal referrals. However, the advent of the internet revolutionized the way professionals connect, collaborate, and advance their careers.LinkedIn, founded in 2003, played a pivotal role in this transformation. It provided a virtual space where professionals from diverse fields could connect, share ideas, and explore opportunities. Today, LinkedIn boasts over 740 million users in more than 200 countries, making it an indispensable tool for career advancement.
LLM Engineer's Handbook
Step into the world of LLMs with this practical guide that takes you from the fundamentals to deploying advanced applications using LLMOps best practicesPurchase of the print or Kindle book includes a free eBook in PDF format"This book is instrumental in making sure that as many people as possible can not only use LLMs but also adapt them, fine-tune them, quantize them, and make them efficient enough to deploy in the real world." - Julien Chaumond, CTO and Co-founder, Hugging FaceBook DescriptionThis LLM book provides practical insights into designing, training, and deploying LLMs in real-world scenarios by leveraging MLOps' best practices. The guide walks you through building an LLM-powered twin that's cost-effective, scalable, and modular. It moves beyond isolated Jupyter Notebooks, focusing on how to build production-grade end-to-end LLM systems.Throughout this book, you will learn data engineering, supervised fine-tuning, and deployment. The hands-on approach to building the LLM twin use case will help you implement MLOps components in your own projects. You will also explore cutting-edge advancements in the field, including inference optimization, preference alignment, and real-time data processing, making this a vital resource for those looking to apply LLMs in their projects.What you will learn- Implement robust data pipelines and manage LLM training cycles- Create your own LLM and refine with the help of hands-on examples- Get started with LLMOps by diving into core MLOps principles like IaC- Perform supervised fine-tuning and LLM evaluation- Deploy end-to-end LLM solutions using AWS and other tools- Explore continuous training, monitoring, and logic automation- Learn about RAG ingestion as well as inference and feature pipelinesWho this book is forThis book is for AI engineers, NLP professionals, and LLM engineers looking to deepen their understanding of LLMs. Basic knowledge of LLMs and the Gen AI landscape, Python and AWS is recommended. Whether you are new to AI or looking to enhance your skills, this book provides comprehensive guidance on implementing LLMs in real-world scenarios.Table of Contents- Undersstanding the LLM Twin Concept and Architecture- Tooling and Installation- Data Engineering- RAG Feature Pipeline- Supervised Fine-tuning- Fine-tuning with Preference Alignment- Evaluating LLMs- Inference Optimization- RAG Inference Pipeline- Inference Pipeline Deployment- MLOps and LLMOps- Appendix: MLOps Principles
From Multimedia Communications to the Future Internet
This Festschrift is dedicated to Ralf Steinmetz on the occasion of his retirement. The honoree is a full professor at the Technical University of Darmstadt in Germany, where he leads the Multimedia Communications lab. He has supervised over 105 successful PhD students and remains committed to his vision of achieving "seamless adaptive multimedia communications." He has been widely recognized for his contributions to the field, prestigious accolades include an Honorary Doctorate from RWTH Aachen University and a Chair of Excellence at the University Carlos III de Madrid. He is also a fellow of several esteemed professional organizations, including the IEEE, the ACM, the GI, and the VDE ITG. A pioneer in multimedia and networking, Ralf Steinmetz's work opened up further research in topics such as distributed systems, e-learning, and serious games. The contributions in this volume reflect his huge impact on research, technical developments, and careers in the areas of multimedia and networking: in Part I, the chapters discuss past research results and their impact, often applying a survey style; in Part II, researchers present current results; and in Part III, the chapters give an outlook on future research directions.
Artificial Intelligence for Cybersecurity
Gain well-rounded knowledge of AI methods in cybersecurity and obtain hands-on experience in implementing them to bring value to your organizationKey Features: - Familiarize yourself with AI methods and approaches and see how they fit into cybersecurity- Learn how to design solutions in cybersecurity that include AI as a key feature- Acquire practical AI skills using step-by-step exercises and code examples- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables.Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can be used to apply these methods, as well as design and implement AI solutions. You'll also examine various cybersecurity scenarios where AI methods are applicable, including exercises and code examples that'll help you effectively apply AI to work on cybersecurity challenges. The book also discusses common pitfalls from real-world applications of AI in cybersecurity issues and teaches you how to tackle them.By the end of this book, you'll be able to not only recognize where AI methods can be applied, but also design and execute efficient solutions using AI methods.What You Will Learn: - Recognize AI as a powerful tool for intelligence analysis of cybersecurity data- Explore all the components and workflow of an AI solution- Find out how to design an AI-based solution for cybersecurity- Discover how to test various AI-based cybersecurity solutions- Evaluate your AI solution and describe its advantages to your organization- Avoid common pitfalls and difficulties when implementing AI solutionsWho this book is for: This book is for machine learning practitioners looking to apply their skills to overcome cybersecurity challenges. Cybersecurity workers who want to leverage machine learning methods will also find this book helpful. Fundamental concepts of machine learning and beginner-level knowledge of Python programming are needed to understand the concepts present in this book. Whether you're a student or an experienced professional, this book offers a unique and valuable learning experience that will enable you to protect your network and data against the ever-evolving threat landscape.Table of Contents- Big Data in Cybersecurity- Automation in Cybersecurity- Cybersecurity Data Analytics- AI, Machine Learning, and Statistics - A Taxonomy- AI Problems and Methods- Workflow, Tools, and Libraries in AI Projects- Malware and Network Intrusion Detection and Analysis- User and Entity Behavior Analysis- Fraud, Spam, and Phishing Detection- User Authentication and Access Control- Threat Intelligence- Anomaly Detection in Industrial Control Systems- Large Language Models and Cybersecurity- Data Quality and Its Usage in the AI and LLM Era- Correlation, Causation, Bias, and Variance- Evaluation, Monitoring, and Feedback Loop- Learning in a Changing and Adversarial Environment- Privacy, Accountability, Explainability, and Trust - Responsible AI- Summary
Optimizing Data Transmission in IoT Networks Using Advanced Techniques
In the expanding landscape of IoT networks, multimedia applications such as online conferencing face significant challenges in maintaining Quality of Service (QoS), including delay, data loss, and costs. This study introduces a multicast routing algorithm based on the Hopfield Neural Network (HNN) to address these QoS issues. Unlike traditional methods, which struggle with increasing data and network complexity, the HNN-based approach effectively adapts to dynamic network topologies to optimize data transmission. The proposed algorithm outperforms conventional techniques, improving overall network performance and reliability by efficiently managing QoS constraints and enhancing data integrity.
Decoding Large Language Models
Explore the architecture, development, and deployment strategies of large language models to unlock their full potentialKey Features: - Gain in-depth insight into LLMs, from architecture through to deployment- Learn through practical insights into real-world case studies and optimization techniques- Get a detailed overview of the AI landscape to tackle a wide variety of AI and NLP challenges- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Ever wondered how large language models (LLMs) work and how they're shaping the future of artificial intelligence? Written by a renowned author and AI, AR, and data expert, Decoding Large Language Models is a combination of deep technical insights and practical use cases that not only demystifies complex AI concepts, but also guides you through the implementation and optimization of LLMs for real-world applications.You'll learn about the structure of LLMs, how they're developed, and how to utilize them in various ways. The chapters will help you explore strategies for improving these models and testing them to ensure effective deployment. Packed with real-life examples, this book covers ethical considerations, offering a balanced perspective on their societal impact. You'll be able to leverage and fine-tune LLMs for optimal performance with the help of detailed explanations. You'll also master techniques for training, deploying, and scaling models to be able to overcome complex data challenges with confidence and precision. This book will prepare you for future challenges in the ever-evolving fields of AI and NLP.By the end of this book, you'll have gained a solid understanding of the architecture, development, applications, and ethical use of LLMs and be up to date with emerging trends, such as GPT-5.What You Will Learn: - Explore the architecture and components of contemporary LLMs- Examine how LLMs reach decisions and navigate their decision-making process- Implement and oversee LLMs effectively within your organization- Master dataset preparation and the training process for LLMs- Hone your skills in fine-tuning LLMs for targeted NLP tasks- Formulate strategies for the thorough testing and evaluation of LLMs- Discover the challenges associated with deploying LLMs in production environments- Develop effective strategies for integrating LLMs into existing systemsWho this book is for: If you're a technical leader working in NLP, an AI researcher, or a software developer interested in building AI-powered applications, this book is for you. To get the most out of this book, you should have a foundational understanding of machine learning principles; proficiency in a programming language such as Python; knowledge of algebra and statistics; and familiarity with natural language processing basics.Table of Contents- LLM Architecture- How LLMs Make Decisions- The Mechanics of Training LLMs- Advanced Training Strategies- Fine-Tuning LLMs for Specific Applications- Testing and Evaluating LLMs- Deploying LLMs in Production- Strategies for Integrating LLMs- Optimization Techniques for Performance- Advanced Optimization and Efficiency- LLM Vulnerabilities, Biases, and Legal Implications- Case Studies - Business Applications and ROI- The Ecosystem of LLM Tools and Frameworks- Preparing for GPT-5 and Beyond- Conclusion and Looking Forward
Node.js Cookbook - Fifth Edition
Master Node.js 22 through expert-led recipes in async programming, app development, Fastify, modules, testing, debugging, and optimizationKey Features: - Explore the latest Node.js 22 features to stay at the forefront of modern development- Learn to build, debug, and deploy Node.js applications flawlessly- Gain expertise in Fastify Web Framework, Node.js module creation, and advanced testing techniques- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Node.js is a game-changing technology for building modern web applications and tooling, bringing the power of JavaScript to the server and enabling full-stack development in a unified language. This updated edition of this Node.js cookbook, featuring Node.js 22, equips you with the latest advancements and enhancements in the Node.js framework ecosystem.From Bethany Griggs, who has served on the Node.js Technical Steering Committee and participated in the Node.js Release Working Group, and Manuel Spigolon, a core maintainer of Fastify, comes this fifth edition of the Node.js Cookbook to help you master Node.js 22. This book guides you step by step through crafting reusable code with Node.js modules, streamlining development using the Fastify web framework, and implementing data persistence in databases and rigorous testing practices for robust applications. You'll address security concerns, optimize performance with worker threads, deploy Node.js microservices using containerization and orchestration, and tackle troubleshooting with effective debugging strategies.Packed with real-world examples, this guide empowers you to harness Node.js 22's full potential for creating secure, performant, and dynamic applications.What You Will Learn: - Grasp Node.js' async/sync programming to optimize code execution- Build your coding skills from scratch by creating basic Node.js apps- Debug and troubleshoot Node.js apps proficiently, ensuring smooth functionality- Deploy apps confidently to production, reaching a wider user base- Harness Fastify for web development to craft efficient frameworks- Develop Node.js modules and enhance code reusability and project structureWho this book is for: If you have basic knowledge of JavaScript or another programming language and want to build a solid understanding of Node.js, this book is for you. It provides the foundational knowledge you need to navigate the Node.js and npm ecosystem and start building applications. For readers with some Node.js experience, it offers the opportunity to deepen and expand their skills, while beginners can use practical recipes to quickly acquire a strong foundation in Node.js concepts and features.Table of Contents- Introducing Node.js 22- Interacting with the File System- Working with Streams- Using Web Protocols- Developing Node.js Modules- Working with Fastify - The Web Framework- Persisting to Databases- Testing with Node.js- Dealing with Security- Optimizing Performance- Deploying Node.js Microservices- Debugging Node.js
How AI Will Shape Our Future
"A fascinating journey into the future of AI, providing a unique perspective that combines technology, economics, geopolitics, and history." - PASCAL BORNET, Technology Influencer, 2 million followers.Written in an accessible style for all audiences, "How AI Will Shape Our Future" anchors readers in the history and evolution of Artificial Intelligence, laying the groundwork for a deeper understanding of its trajectory. This equips readers to engage more thoughtfully with the book's central theme: What should societies expect from AI in the decades ahead?How does AI actually function? What will its impact be on employment and education, both short-term and long-term? How will AI reshape society, the economy, government, culture, and geopolitics? What are the potential utopian and dystopian outcomes, and who will be most affected? What's happening with China and the intensifying AI arms race? Could synthetic biology lead to human-cyborg coexistence, ultimately influencing human evolution? Most critically, what should we demand of our leaders today to prepare for AI's inevitable advancement?These are just some of the provocative questions explored and answered by Pedro Uria-Recio, a former McKinsey consultant and Chief AI Officer who has spent years working with this transformative technology on a global scale.Whether you're a technologist or a homemaker, a businessperson or a student, a voter or a policymaker, or simply curious about humanity's future, "How AI Will Shape Our Future" offers essential insights for navigating the complexities of AI.How AI Will Shape Our Future- Humanity Interlaces with AI: AI is our new mind. Robotics, our new body. How are we becoming a new species at the intersection of carbon and silicon?- AI Gets Exponential: Artificial General Intelligence. Humanoids and cyborgs. Synthetic biology. Quantum computing. Mind emulation. How will they unfold?- AI Authoritarianism Looms: AI will render truth obsolete, freedom redefined, and job scarcity ubiquitous. Can we still shape AI for the benefit of all?- Geopolitics Supercharged: Super Intelligence will be worshiped. China and America will clash over their views on AI. Politics will be centered on species identities.- Humanity's Greatest Epic: From Mythology to Kubrick. From Aristotle to Sam Altman. From Leonardo to Boston Dynamics. From today to Superintelligence.- Stay Ahead with AI: Critical thinking. Adaptability. Entrepreneurship."A seminal work, brilliantly navigating the transformative impact of AI on humanity and the advent of the machine economy, promising a harmonious fusion of technology and societal progress."-Professor Paul J. Morrissey, Professor at Liverpool John Moores University, Feb 15, 2024"I'm left utterly speechless after reading this book! It truly expanded my mind, especially in its contemplation of the future implications of AI."-D. Rob, April 28, 2024"Skillfully weaves together history, analysis, and thought-provoking predictions, challenging readers to confront the ethical and philosophical implications of this transformative technology. Recommend!"-Zahid, June 9, 2024"AI Magnum Opus! What an in-depth and thorough volume on AI. From ancient history to future predictions, political implications, potential impacts, and outcomes, if there is any question you have about AI impact, this book likely touches on it. Vast in its breadth and intelligent insights."-J Palmer, May 20, 2024
Future Access Enablers for Ubiquitous and Intelligent Infrastructures
This book constitutes the refereed post-conference proceedings of the 8th EAI International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2024, held in Zagreb, Croatia, during May 9-10, 2024. The 14 full papers were carefully reviewed and selected from 35 submissions. The papers are organized in thematic sessions on: Future access networks, Sustainable Communications Computing Infrastructures, Environment Applications Scenarios.
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security. In this context, it does not seem possible to analyze the developments in the field of cyber security only with information theft or hacking, especially in the age of artificial intelligence and autonomous weapons. For this reason, the main purpose of this book is to explain the phenomena from a different perspective by addressing artificial intelligence and autonomous weapons, which remain in the background while focusing on cyber security. By addressing these phenomena, the book aims to make the study multidisciplinary and to include authors from different countries and different geographies. The scope and content of the study differs significantly from other books in terms of the issues it addresses and deals with.When we look at the main features of the study, we can say the following: Handles the concept of security within the framework of technological development Includes artificial intelligence and radicalization, which has little place in the literature Evaluates the phenomenon of cyber espionage Provides an approach to future wars Examines the course of wars within the framework of the Clausewitz trilogy Explores ethical elements Addresses legal approaches In this context, the book offers readers a hope as well as a warning about how technology can be used for the public good. Individuals working in government, law enforcement, and technology companies can learn useful lessons from it.
Leveraging Blockchain Technology
Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions. It is essentially an often decentralized, distributed, peer-to-peer database that is maintained by a network of computers instead of a single entity, making it highly resistant to hacking and data breaches.
Security and Privacy in Communication Networks
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
ChatGPT and the Future of AI
An insightful exploration of Chat GPT and other advanced AI systems--how we got here, where we're headed, and what it all means for how we interact with the world. In ChatGPT and the Future of AI, the sequel to The Deep Learning Revolution, Terrence Sejnowski offers a nuanced exploration of large language models (LLMs) like ChatGPT and what their future holds. How should we go about understanding LLMs? Do these language models truly understand what they are saying? Or is it possible that what appears to be intelligence in LLMs may be a mirror that merely reflects the intelligence of the interviewer? In this book, Sejnowski, a pioneer in computational approaches to understanding brain function, answers all our urgent questions about this astonishing new technology. Sejnowski begins by describing the debates surrounding LLMs' comprehension of language and exploring the notions of "thinking" and "intelligence." He then takes a deep dive into the historical evolution of language models, focusing on the role of transformers, the correlation between computing power and model size, and the intricate mathematics shaping LLMs. Sejnowski also provides insight into the historical roots of LLMs and discusses the potential future of AI, focusing on next-generation LLMs inspired by nature and the importance of developing energy-efficient technologies. Grounded in Sejnowski's dual expertise in AI and neuroscience, ChatGPT and the Future of AI is the definitive guide to understanding the intersection of AI and human intelligence.
ISO 27001 Controls
Following the success of the first edition, this book has been re-released to reflect the ISO/IEC 27001:2022 and ISO/IEC 27002:2022 updates.Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001:2022 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001:2022. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001:2022.The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit.This guide is intended to be used by those involved in: - Designing, implementing and/or maintaining an ISMS;- Preparing for ISMS audits and assessments; or- Undertaking both internal and third-party ISMS audits and assessments.
Learning PyTorch 2.0, Second Edition
"Learning PyTorch 2.0, Second Edition" is a fast-learning, hands-on book that emphasizes practical PyTorch scripting and efficient model development using PyTorch 2.3 and CUDA 12. This edition is centered on practical applications and presents a concise methodology for attaining proficiency in the most recent features of PyTorch. The book presents a practical program based on the fish dataset which provides step-by-step guidance through the processes of building, training and deploying neural networks, with each example prepared for immediate implementation. Given your familiarity with machine learning and neural networks, this book offers concise explanations of foundational topics, allowing you to proceed directly to the practical, advanced aspects of PyTorch programming. The key learnings include the design of various types of neural networks, the use of torch.compile() for performance optimization, the deployment of models using TorchServe, and the implementation of quantization for efficient inference. Furthermore, you will also learn to migrate TensorFlow models to PyTorch using the ONNX format. The book employs essential libraries, including torchvision, torchserve, tf2onnx, onnxruntime, and requests, to facilitate seamless integration of PyTorch with production environments.Key LearningsMaster tensor manipulations and advanced operations using PyTorch's efficient tensor libraries.Build feedforward, convolutional, and recurrent neural networks from scratch.Implement transformer models for modern natural language processing tasks.Use CUDA 12 and mixed precision training (AMP) to accelerate model training and inference.Deploy PyTorch models in production using TorchServe, including multi-model serving and versioning.Migrate TensorFlow models to PyTorch using ONNX format for seamless cross-framework compatibility.Optimize neural network architectures using torch.compile() for improved speed and efficiency.Utilize PyTorch's Quantization API to reduce model size and speed up inference.Setup custom layers and architectures for neural networks to tackle domain-specific problems.Monitor and log model performance in real-time using TorchServe's built-in tools and configurations.Table of ContentIntroduction To PyTorch 2.3 and CUDA 12Getting Started with TensorsBuilding Neural Networks with PyTorchTraining Neural NetworksAdvanced Neural Network ArchitecturesQuantization and Model OptimizationMigrating TensorFlow to PyTorchDeploying PyTorch Models with TorchServe
Introduction to Confidential Computing
DESCRIPTION In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats.Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection.By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations.WHAT YOU WILL LEARN● Learn why confidential computing is crucial in today's digital world.● Understand high-level architecture of various trusted execution environments implementations.● Art of developing secure applications that can be deployed on TEE.● Comprehend how remote attestation ensures the integrity of computing environments.● Discover how RA-TLS could reshape the future of secure communications. ● Explore how confidential computing protects data and AI models.WHO THIS BOOK IS FORThis book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models.
Digital Twin
This book introduces the computing, mathematical and engineering background to understand and develop the concept of the digital twin. It provides background in modeling/simulation, computing technology, sensor/actuators, and so forth, needed to develop the next generation of digital twins.
Research Advances in Intelligent Computing
This book presents the advances in AI techniques under the umbrella of Intelligent Computing. The book provides theoretical, algorithmic, simulation, and implementation-based recent research advancements related to the Intelligent Computing.
AI for Big Data-Based Engineering Applications from Security Perspectives
This book emphasizes the idea of understanding the motivation of the advanced circuits' design to establish the AI interface and to mitigate the security attacks in a better way for big data. It is for students, researchers, and professionals, faculty members and software developers who wish to carry out further research.
Emerging Technologies and the Indian IT Sector
This book examines the implementation of emerging technology projects in the service-based Indian IT sector. It shows how emerging technologies impact IT enabled Services (ITeS) organizations and examines the mobility prospects for engineers and students looking to enter IT.
The Zero Trust Framework
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
Machine Learning
For sales in India check Indian online stores.Thank you for being part of the technological world through the reading.Machine Learning as well as programming remains challenging both to teach and learn. In this book, 10 classifiers are taught with their practical codes. The examples show the difference which happen when the 10 classifiers are used. The books also offers basic understanding of programming first before proceeding to machine learning.Book is of A5 size which makes it handy for scholars or novice learners who want to have a theoretical exposure.
Cloud Computing, Big Data and Emerging Topics
This volume CCIS 2189 constitutes the refereed proceedings of the 12th Conference, JCC-BD&ET 2024, held in La Plata, Argentina during June 25-27, 2024. The 12 full papers presented were carefully reviewed and selected from 37 submissions. They were categorized under the topical sections as follows: Parallel and Distributed Computing, Machine and Deep Learning, Smart Cities and E-Government, Visualization, Emerging Topics, Innovation in Computer Science Education, Computer Security.
Better Onboarding
When users try your product or service for the first time, what encourages them to come back? Onboarding can make the difference between abandoned accounts and devoted use-if we design it as a holistic, ongoing process.Krystal Higgins demonstrates how the best onboarding experiences guide people as they interact, helping them follow their own path to success. Gain practical strategies and techniques for designing effective guidance, whether you're working through a redesign, launching new features, rolling out service updates, or welcoming back returning users. Set aside the tutorials, manuals, and intrusive instructions of the past, and learn how to use guided interaction to help users find their way-and get value out of every step.THIS BOOK EXPLORES: How to effectively greet, engage, and retain customersBest practices for mapping users' onboarding journeys from start to finishBringing research, content, design, and functionality together to support new usersSteps for breaking down onboarding actions for more efficient implementationTechniques for embedding guidance in the context of the full product experience
Cybersecurity Simplified
In today's interconnected world, cybersecurity is no longer optional-it's a necessity. Cybersecurity Simplified offers a clear and comprehensive guide to understanding the complexities of cybersecurity, tailored for those new to the field. Whether you're a student, job seeker, or an IT professional looking to broaden your expertise, this book will equip you with the essential knowledge and skills to protect digital environments from ever-evolving threats. Starting with the historical evolution of cybersecurity, the book covers critical topics such as the CIA triad, network security, and the various forms of cyber threats including malware, phishing, and advanced persistent threats (APTs).What will you learn?This book is designed to provide you with: Insight into Cyber Threats: Learn about various cyber threats ranging from traditional malware and phishing to sophisticated attacks like ransomware and advanced persistent threats (APTs). Discover how these threats impact individuals, organizations, and global security.Practical Applications of Cybersecurity: Dive into real-world scenarios and case studies that demonstrate how cybersecurity strategies are applied across different industries and sectors.The Role of Artificial Intelligence: Explore how AI is revolutionizing cybersecurity, from enhancing predictive analytics and anomaly detection to automating threat responses. You'll also examine the ethical implications and challenges that come with integrating AI into cybersecurity practices.Hands-On Experience: Engage in a practical project that guides you through implementing a cybersecurity solution using Python or another programming language. This hands-on experience will solidify your theoretical knowledge and build your confidence in applying cybersecurity concepts in real-world environments.Table of ContentsIntroduction to CybersecurityThe Importance of Cybersecurity Understanding Cyber ThreatsCybersecurity FundamentalsNetwork SecurityApplication SecurityData SecurityCybersecurity in the CloudArtificial Intelligence in CybersecurityFuture Trends in Cybersecurity Practical Application
From Street-Smart to Web-Wise(r)
"From Street-smart to Web-wise(R) A Safety Training Manual Built for Teachers and Designed for Children," isn't just another book-it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.
A Reference Manual for Data Privacy Laws and Cyber Frameworks
In this book we detail the tenets and provisions of three key Data Privacy Laws. We also provide a general framework at the end as to how a business can come into compliance with these various Data Privacy Laws.
From Street-Smart to Web-Wise(r)
"From Street-smart to Web-wise(R) A Safety Training Manual Built for Teachers and Designed for Children," isn't just another book-it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.
A Reference Manual for Data Privacy Laws and Cyber Frameworks
In this book we detail the tenets and provisions of three key Data Privacy Laws. We also provide a general framework at the end as to how a business can come into compliance with these various Data Privacy Laws.
The Art of Cyber Defense
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Phishing for Answers
In the context of information security, social engineering is the manipulation of people into performing actions or divulging information for the purpose of gathering, defrauding, or gaining unauthorized system access. While some of the most common forms of social engineering involve telephone or social networks where criminals pose as employees of targeted organizations, phishing accounts for 96% of all successful cyber-attacks. Governments and private organizations have responded through various means such as training employees, executing internal vulnerability assessments, and ad campaigns. Despite all these efforts, phishing continues to provide the primary cyber-attack vector for nefarious entities. Phishing attacks continue to escalate, with over 300,000 reported incidents in the US alone last year. This book provides an in-depth look at the anatomy of modern phishing threats and how they are evolving with AI technologies. Readers will learn about the latest social engineering tactics used by cybercriminals, including deepfakes for audio/video manipulation and AI-generated spear-phishing campaigns, and discover emerging defensive tools that leverage machine learning to detect anomalies and protect against hyper-personalized phishing attempts. With phishing losses averaging millions per breach, this book equips readers with the knowledge to identify risks and implement robust countermeasures as these attacks become increasingly sophisticated and difficult to spot. Written by two experts in the field, bringing together their wide experience in academic research, security engineering, incident response and cyber forensics, this book offers valuable insights for researchers, engineers, cybersecurity professionals and organizational leaders working in cyber security, information technology, network and infrastructure security, endpoint protection, data governance, risk and compliance, digital forensics, incident response, operational technology and industrial control systems.
Mastering Honeypots
DESCRIPTION Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future attacks.This book simplifies the concept of honeypots, which are important tools in cybersecurity. The book explains their history, types, and how to design and use them effectively. It includes practical advice on setting up honeypots, monitoring them, and analyzing attacks. It also offers strategies for blue team professionals, like SOC analysts, to improve defenses and serves as a helpful resource for purple team members to practice detecting attacks. Additionally, it discusses how honeypots contribute to threat intelligence and cybersecurity training, including new ideas like quantum honeypots, preparing professionals to face modern cyber threats.By the end of this book, you will be able to effectively deploy and manage honeypots, analyze attack data, and implement strategies to protect your organization from malicious attacks.KEY FEATURES ● Design and deployment of honeypot to trap hackers.● Step-by-step guide for implementation with best practices.● Quantum insights and threat anticipation for future-proof defense.WHAT YOU WILL LEARN● Acquire an understanding of honeypot technology, from foundational concepts to advanced techniques.● Learn how to design and implement honeypots tailored to specific security needs and threat landscapes.● Effectively monitor and analyze honeypot data to detect and respond to attacks.● Explore advanced honeypot techniques, such as honeypot farms and distributed honeypot networks.WHO THIS BOOK IS FORThis book is a vital resource for CTOs, CISOs, InfoSec managers, InfoSec analysts, and network admins. This book will help students and researchers who are working in the domain of cybersecurity.
Cryptology and Network Security
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024. The 25 papers included in these volumes were carefully reviewed and selected from 76 submissions. The papers presented in these two volumes are organized in the following topical sections: - Part I: Multi-party Computation; Post-quantum Security; Anonymity and Privacy; Blockchain Technology. Part II: Cyber Security and Leakage; Machine Learning and Security; Provable Security; Cryptanalysis.
Generative AI and Cyberbullying
In this particular book, we actually take the good side of Gen AI, provide an overview as to how it can be used to help combat Cyberbullying.
The Ciso Playbook
The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow.