0101~0102_天獄園2
1231~0102_金網寒假動漫節

英文書 > 全部商品

Information Security

Nicky,Mouha  著
Springer 出版
2024/10/24 出版

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.

9 特價3577
立即代訂
下次再買

Advances in Bias and Fairness in Information Retrieval

Springer 出版
2024/10/24 出版

This book constitutes the refereed proceedings of the 5th International Workshop on Algorithmic Bias in Search and Recommendation, BIAS 2024, held in Washington, DC, USA, on July 18, 2024 in hybrid mode. The 7 full papers included in this book were carefully reviewed and selected from 20 submissions. They are grouped into three thematic sessions, each focusing on distinct aspects of bias and fairness in information retrieval.

9 特價3100
立即代訂
下次再買

ManusCrypt

CRC Press 出版
2024/10/23 出版

Information security primarily serves these six distinct purposes--authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon cryptography. The author begins as a protagonist to explain that modern cryptography is more suited for machines rather than humans. This is explained through a brief history of ciphers and their evolution into cryptography and its various forms. The premise is further reinforced by a critical assessment of algorithm-based modern cryptography in the age of emerging technologies like artificial intelligence and blockchain. With simple and lucid examples, the author demonstrates that the hypothetical "man versus machine" scenario is not by chance, but by design. The book doesn't end here like most others that wind up with a sermon on ethics and eventual merging of humans with technology (i.e., singularity). A very much practicable solution has been presented with a real-world use-case scenario, wherein infosec is designed around the needs, biases, flaws and skills of humans. This innovative approach, as trivial as it may seem to some, has the power to bring about a paradigm shift in the overall strategy of information technology that can change our world for the better.

9 特價2861
立即代訂
下次再買

LLM Engineer's Handbook

Paul,Iusztin  著
Packt 出版
2024/10/22 出版

Step into the world of LLMs with this practical guide that takes you from the fundamentals to deploying advanced applications using LLMOps best practicesPurchase of the print or Kindle book includes a free eBook in PDF format"This book is instrumental in making sure that as many people as possible can not only use LLMs but also adapt them, fine-tune them, quantize them, and make them efficient enough to deploy in the real world." - Julien Chaumond, CTO and Co-founder, Hugging FaceBook DescriptionThis LLM book provides practical insights into designing, training, and deploying LLMs in real-world scenarios by leveraging MLOps' best practices. The guide walks you through building an LLM-powered twin that's cost-effective, scalable, and modular. It moves beyond isolated Jupyter Notebooks, focusing on how to build production-grade end-to-end LLM systems.Throughout this book, you will learn data engineering, supervised fine-tuning, and deployment. The hands-on approach to building the LLM twin use case will help you implement MLOps components in your own projects. You will also explore cutting-edge advancements in the field, including inference optimization, preference alignment, and real-time data processing, making this a vital resource for those looking to apply LLMs in their projects.What you will learn- Implement robust data pipelines and manage LLM training cycles- Create your own LLM and refine with the help of hands-on examples- Get started with LLMOps by diving into core MLOps principles like IaC- Perform supervised fine-tuning and LLM evaluation- Deploy end-to-end LLM solutions using AWS and other tools- Explore continuous training, monitoring, and logic automation- Learn about RAG ingestion as well as inference and feature pipelinesWho this book is forThis book is for AI engineers, NLP professionals, and LLM engineers looking to deepen their understanding of LLMs. Basic knowledge of LLMs and the Gen AI landscape, Python and AWS is recommended. Whether you are new to AI or looking to enhance your skills, this book provides comprehensive guidance on implementing LLMs in real-world scenarios.Table of Contents- Undersstanding the LLM Twin Concept and Architecture- Tooling and Installation- Data Engineering- RAG Feature Pipeline- Supervised Fine-tuning- Fine-tuning with Preference Alignment- Evaluating LLMs- Inference Optimization- RAG Inference Pipeline- Inference Pipeline Deployment- MLOps and LLMOps- Appendix: MLOps Principles

9 特價2538
立即代訂
下次再買

Generative AI and Digital Forensics

Ravindra,Das  著
CRC Press 出版
2024/10/22 出版

In today's world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the information technology/network infrastructure. From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.But another key step here is to investigate how and why the security breach happened in the first place. The best way to do this is through what is known as "digital forensics". This is where specially trained digital forensics investigators collect and comb through every piece of evidence to determine this. Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer for their crime and eventually be brought to justice.However, the area of digital forensics is a large one, and many topics around it can be covered. Also, generative AI is being used to not only help in the analysis of the evidence but also to help automate the digital forensics software packages that are available today. Therefore, in this book, the following is covered: Examples of security breaches and overview of digital forensics. How digital forensics can be used to investigate the loss or theft of data. An introduction to the SQL Server Database. A review of the SQL Injection Attack. How generative AI can be used in digital forensics.

9 特價6678
立即代訂
下次再買

ManusCrypt

CRC Press 出版
2024/10/22 出版

Information security primarily serves these six distinct purposes--authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon cryptography. The author begins as a protagonist to explain that modern cryptography is more suited for machines rather than humans. This is explained through a brief history of ciphers and their evolution into cryptography and its various forms. The premise is further reinforced by a critical assessment of algorithm-based modern cryptography in the age of emerging technologies like artificial intelligence and blockchain. With simple and lucid examples, the author demonstrates that the hypothetical "man versus machine" scenario is not by chance, but by design. The book doesn't end here like most others that wind up with a sermon on ethics and eventual merging of humans with technology (i.e., singularity). A very much practicable solution has been presented with a real-world use-case scenario, wherein infosec is designed around the needs, biases, flaws and skills of humans. This innovative approach, as trivial as it may seem to some, has the power to bring about a paradigm shift in the overall strategy of information technology that can change our world for the better.

9 特價6678
立即代訂
下次再買

Mastering LinkedIn

Teja,Laveti  著
2024/10/22 出版

In the digital age, networking and professional growth have transcended traditional boundaries. LinkedIn, the world's largest professional network, has emerged as a critical platform for individuals and businesses alike. This chapter delves into why LinkedIn matters, how it has transformed the professional landscape, and the myriad benefits of having an optimized LinkedIn profile.Professional networking has always been a cornerstone of career development. In the past, networking primarily occurred through face-to-face interactions, industry conferences, and personal referrals. However, the advent of the internet revolutionized the way professionals connect, collaborate, and advance their careers.LinkedIn, founded in 2003, played a pivotal role in this transformation. It provided a virtual space where professionals from diverse fields could connect, share ideas, and explore opportunities. Today, LinkedIn boasts over 740 million users in more than 200 countries, making it an indispensable tool for career advancement.

9 特價567
立即代訂
下次再買

Generative AI and Digital Forensics

Ravindra,Das  著
CRC Press 出版
2024/10/22 出版

In today's world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the information technology/network infrastructure. From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.But another key step here is to investigate how and why the security breach happened in the first place. The best way to do this is through what is known as "digital forensics". This is where specially trained digital forensics investigators collect and comb through every piece of evidence to determine this. Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer for their crime and eventually be brought to justice.However, the area of digital forensics is a large one, and many topics around it can be covered. Also, generative AI is being used to not only help in the analysis of the evidence but also to help automate the digital forensics software packages that are available today. Therefore, in this book, the following is covered: Examples of security breaches and overview of digital forensics. How digital forensics can be used to investigate the loss or theft of data. An introduction to the SQL Server Database. A review of the SQL Injection Attack. How generative AI can be used in digital forensics.

9 特價1812
立即代訂
下次再買

Stabilization, Safety, and Security of Distributed Systems

Springer 出版
2024/10/21 出版

This book constitutes the proceedings of the 26th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2024, held in Nagoya, Japan, during October 20-22, 2024. The 22 full and 4 invited papers as well as 6 short papers included in this book were carefully reviewed and selected from 69 submissions. They deal with the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment. The book also includes one invited talk in full paper length.

9 特價4175
貨到通知
下次再買

From Multimedia Communications to the Future Internet

Springer 出版
2024/10/20 出版

This Festschrift is dedicated to Ralf Steinmetz on the occasion of his retirement. The honoree is a full professor at the Technical University of Darmstadt in Germany, where he leads the Multimedia Communications lab. He has supervised over 105 successful PhD students and remains committed to his vision of achieving "seamless adaptive multimedia communications." He has been widely recognized for his contributions to the field, prestigious accolades include an Honorary Doctorate from RWTH Aachen University and a Chair of Excellence at the University Carlos III de Madrid. He is also a fellow of several esteemed professional organizations, including the IEEE, the ACM, the GI, and the VDE ITG. A pioneer in multimedia and networking, Ralf Steinmetz's work opened up further research in topics such as distributed systems, e-learning, and serious games. The contributions in this volume reflect his huge impact on research, technical developments, and careers in the areas of multimedia and networking: in Part I, the chapters discuss past research results and their impact, often applying a survey style; in Part II, researchers present current results; and in Part III, the chapters give an outlook on future research directions.

9 特價3100
立即代訂
下次再買

Artificial Intelligence for Cybersecurity

Packt 出版
2024/10/18 出版

Gain well-rounded knowledge of AI methods in cybersecurity and obtain hands-on experience in implementing them to bring value to your organizationKey Features: - Familiarize yourself with AI methods and approaches and see how they fit into cybersecurity- Learn how to design solutions in cybersecurity that include AI as a key feature- Acquire practical AI skills using step-by-step exercises and code examples- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables.Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can be used to apply these methods, as well as design and implement AI solutions. You'll also examine various cybersecurity scenarios where AI methods are applicable, including exercises and code examples that'll help you effectively apply AI to work on cybersecurity challenges. The book also discusses common pitfalls from real-world applications of AI in cybersecurity issues and teaches you how to tackle them.By the end of this book, you'll be able to not only recognize where AI methods can be applied, but also design and execute efficient solutions using AI methods.What You Will Learn: - Recognize AI as a powerful tool for intelligence analysis of cybersecurity data- Explore all the components and workflow of an AI solution- Find out how to design an AI-based solution for cybersecurity- Discover how to test various AI-based cybersecurity solutions- Evaluate your AI solution and describe its advantages to your organization- Avoid common pitfalls and difficulties when implementing AI solutionsWho this book is for: This book is for machine learning practitioners looking to apply their skills to overcome cybersecurity challenges. Cybersecurity workers who want to leverage machine learning methods will also find this book helpful. Fundamental concepts of machine learning and beginner-level knowledge of Python programming are needed to understand the concepts present in this book. Whether you're a student or an experienced professional, this book offers a unique and valuable learning experience that will enable you to protect your network and data against the ever-evolving threat landscape.Table of Contents- Big Data in Cybersecurity- Automation in Cybersecurity- Cybersecurity Data Analytics- AI, Machine Learning, and Statistics - A Taxonomy- AI Problems and Methods- Workflow, Tools, and Libraries in AI Projects- Malware and Network Intrusion Detection and Analysis- User and Entity Behavior Analysis- Fraud, Spam, and Phishing Detection- User Authentication and Access Control- Threat Intelligence- Anomaly Detection in Industrial Control Systems- Large Language Models and Cybersecurity- Data Quality and Its Usage in the AI and LLM Era- Correlation, Causation, Bias, and Variance- Evaluation, Monitoring, and Feedback Loop- Learning in a Changing and Adversarial Environment- Privacy, Accountability, Explainability, and Trust - Responsible AI- Summary

9 特價2065
立即代訂
下次再買

Decoding Large Language Models

Irena,Cronin  著
Packt 出版
2024/10/18 出版

Explore the architecture, development, and deployment strategies of large language models to unlock their full potentialKey Features: - Gain in-depth insight into LLMs, from architecture through to deployment- Learn through practical insights into real-world case studies and optimization techniques- Get a detailed overview of the AI landscape to tackle a wide variety of AI and NLP challenges- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Ever wondered how large language models (LLMs) work and how they're shaping the future of artificial intelligence? Written by a renowned author and AI, AR, and data expert, Decoding Large Language Models is a combination of deep technical insights and practical use cases that not only demystifies complex AI concepts, but also guides you through the implementation and optimization of LLMs for real-world applications.You'll learn about the structure of LLMs, how they're developed, and how to utilize them in various ways. The chapters will help you explore strategies for improving these models and testing them to ensure effective deployment. Packed with real-life examples, this book covers ethical considerations, offering a balanced perspective on their societal impact. You'll be able to leverage and fine-tune LLMs for optimal performance with the help of detailed explanations. You'll also master techniques for training, deploying, and scaling models to be able to overcome complex data challenges with confidence and precision. This book will prepare you for future challenges in the ever-evolving fields of AI and NLP.By the end of this book, you'll have gained a solid understanding of the architecture, development, applications, and ethical use of LLMs and be up to date with emerging trends, such as GPT-5.What You Will Learn: - Explore the architecture and components of contemporary LLMs- Examine how LLMs reach decisions and navigate their decision-making process- Implement and oversee LLMs effectively within your organization- Master dataset preparation and the training process for LLMs- Hone your skills in fine-tuning LLMs for targeted NLP tasks- Formulate strategies for the thorough testing and evaluation of LLMs- Discover the challenges associated with deploying LLMs in production environments- Develop effective strategies for integrating LLMs into existing systemsWho this book is for: If you're a technical leader working in NLP, an AI researcher, or a software developer interested in building AI-powered applications, this book is for you. To get the most out of this book, you should have a foundational understanding of machine learning principles; proficiency in a programming language such as Python; knowledge of algebra and statistics; and familiarity with natural language processing basics.Table of Contents- LLM Architecture- How LLMs Make Decisions- The Mechanics of Training LLMs- Advanced Training Strategies- Fine-Tuning LLMs for Specific Applications- Testing and Evaluating LLMs- Deploying LLMs in Production- Strategies for Integrating LLMs- Optimization Techniques for Performance- Advanced Optimization and Efficiency- LLM Vulnerabilities, Biases, and Legal Implications- Case Studies - Business Applications and ROI- The Ecosystem of LLM Tools and Frameworks- Preparing for GPT-5 and Beyond- Conclusion and Looking Forward

9 特價2115
立即代訂
下次再買

Optimizing Data Transmission in IoT Networks Using Advanced Techniques

2024/10/18 出版

In the expanding landscape of IoT networks, multimedia applications such as online conferencing face significant challenges in maintaining Quality of Service (QoS), including delay, data loss, and costs. This study introduces a multicast routing algorithm based on the Hopfield Neural Network (HNN) to address these QoS issues. Unlike traditional methods, which struggle with increasing data and network complexity, the HNN-based approach effectively adapts to dynamic network topologies to optimize data transmission. The proposed algorithm outperforms conventional techniques, improving overall network performance and reliability by efficiently managing QoS constraints and enhancing data integrity.

9 特價3680
立即代訂
下次再買

Node.js Cookbook - Fifth Edition

Packt 出版
2024/10/18 出版

Master Node.js 22 through expert-led recipes in async programming, app development, Fastify, modules, testing, debugging, and optimizationKey Features: - Explore the latest Node.js 22 features to stay at the forefront of modern development- Learn to build, debug, and deploy Node.js applications flawlessly- Gain expertise in Fastify Web Framework, Node.js module creation, and advanced testing techniques- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Node.js is a game-changing technology for building modern web applications and tooling, bringing the power of JavaScript to the server and enabling full-stack development in a unified language. This updated edition of this Node.js cookbook, featuring Node.js 22, equips you with the latest advancements and enhancements in the Node.js framework ecosystem.From Bethany Griggs, who has served on the Node.js Technical Steering Committee and participated in the Node.js Release Working Group, and Manuel Spigolon, a core maintainer of Fastify, comes this fifth edition of the Node.js Cookbook to help you master Node.js 22. This book guides you step by step through crafting reusable code with Node.js modules, streamlining development using the Fastify web framework, and implementing data persistence in databases and rigorous testing practices for robust applications. You'll address security concerns, optimize performance with worker threads, deploy Node.js microservices using containerization and orchestration, and tackle troubleshooting with effective debugging strategies.Packed with real-world examples, this guide empowers you to harness Node.js 22's full potential for creating secure, performant, and dynamic applications.What You Will Learn: - Grasp Node.js' async/sync programming to optimize code execution- Build your coding skills from scratch by creating basic Node.js apps- Debug and troubleshoot Node.js apps proficiently, ensuring smooth functionality- Deploy apps confidently to production, reaching a wider user base- Harness Fastify for web development to craft efficient frameworks- Develop Node.js modules and enhance code reusability and project structureWho this book is for: If you have basic knowledge of JavaScript or another programming language and want to build a solid understanding of Node.js, this book is for you. It provides the foundational knowledge you need to navigate the Node.js and npm ecosystem and start building applications. For readers with some Node.js experience, it offers the opportunity to deepen and expand their skills, while beginners can use practical recipes to quickly acquire a strong foundation in Node.js concepts and features.Table of Contents- Introducing Node.js 22- Interacting with the File System- Working with Streams- Using Web Protocols- Developing Node.js Modules- Working with Fastify - The Web Framework- Persisting to Databases- Testing with Node.js- Dealing with Security- Optimizing Performance- Deploying Node.js Microservices- Debugging Node.js

9 特價1692
立即代訂
下次再買

How AI Will Shape Our Future

2024/10/18 出版

"A fascinating journey into the future of AI, providing a unique perspective that combines technology, economics, geopolitics, and history." - PASCAL BORNET, Technology Influencer, 2 million followers.Written in an accessible style for all audiences, "How AI Will Shape Our Future" anchors readers in the history and evolution of Artificial Intelligence, laying the groundwork for a deeper understanding of its trajectory. This equips readers to engage more thoughtfully with the book's central theme: What should societies expect from AI in the decades ahead?How does AI actually function? What will its impact be on employment and education, both short-term and long-term? How will AI reshape society, the economy, government, culture, and geopolitics? What are the potential utopian and dystopian outcomes, and who will be most affected? What's happening with China and the intensifying AI arms race? Could synthetic biology lead to human-cyborg coexistence, ultimately influencing human evolution? Most critically, what should we demand of our leaders today to prepare for AI's inevitable advancement?These are just some of the provocative questions explored and answered by Pedro Uria-Recio, a former McKinsey consultant and Chief AI Officer who has spent years working with this transformative technology on a global scale.Whether you're a technologist or a homemaker, a businessperson or a student, a voter or a policymaker, or simply curious about humanity's future, "How AI Will Shape Our Future" offers essential insights for navigating the complexities of AI.How AI Will Shape Our Future- Humanity Interlaces with AI: AI is our new mind. Robotics, our new body. How are we becoming a new species at the intersection of carbon and silicon?- AI Gets Exponential: Artificial General Intelligence. Humanoids and cyborgs. Synthetic biology. Quantum computing. Mind emulation. How will they unfold?- AI Authoritarianism Looms: AI will render truth obsolete, freedom redefined, and job scarcity ubiquitous. Can we still shape AI for the benefit of all?- Geopolitics Supercharged: Super Intelligence will be worshiped. China and America will clash over their views on AI. Politics will be centered on species identities.- Humanity's Greatest Epic: From Mythology to Kubrick. From Aristotle to Sam Altman. From Leonardo to Boston Dynamics. From today to Superintelligence.- Stay Ahead with AI: Critical thinking. Adaptability. Entrepreneurship."A seminal work, brilliantly navigating the transformative impact of AI on humanity and the advent of the machine economy, promising a harmonious fusion of technology and societal progress."-Professor Paul J. Morrissey, Professor at Liverpool John Moores University, Feb 15, 2024"I'm left utterly speechless after reading this book! It truly expanded my mind, especially in its contemplation of the future implications of AI."-D. Rob, April 28, 2024"Skillfully weaves together history, analysis, and thought-provoking predictions, challenging readers to confront the ethical and philosophical implications of this transformative technology. Recommend!"-Zahid, June 9, 2024"AI Magnum Opus! What an in-depth and thorough volume on AI. From ancient history to future predictions, political implications, potential impacts, and outcomes, if there is any question you have about AI impact, this book likely touches on it. Vast in its breadth and intelligent insights."-J Palmer, May 20, 2024

9 特價725
立即代訂
下次再買

Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons

CRC Press 出版
2024/10/17 出版

Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security. In this context, it does not seem possible to analyze the developments in the field of cyber security only with information theft or hacking, especially in the age of artificial intelligence and autonomous weapons. For this reason, the main purpose of this book is to explain the phenomena from a different perspective by addressing artificial intelligence and autonomous weapons, which remain in the background while focusing on cyber security. By addressing these phenomena, the book aims to make the study multidisciplinary and to include authors from different countries and different geographies. The scope and content of the study differs significantly from other books in terms of the issues it addresses and deals with.When we look at the main features of the study, we can say the following: Handles the concept of security within the framework of technological development Includes artificial intelligence and radicalization, which has little place in the literature Evaluates the phenomenon of cyber espionage Provides an approach to future wars Examines the course of wars within the framework of the Clausewitz trilogy Explores ethical elements Addresses legal approaches In this context, the book offers readers a hope as well as a warning about how technology can be used for the public good. Individuals working in government, law enforcement, and technology companies can learn useful lessons from it.

9 特價6678
立即代訂
下次再買

Leveraging Blockchain Technology

Shaun,Aghili  著
CRC Press 出版
2024/10/17 出版

Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions. It is essentially an often decentralized, distributed, peer-to-peer database that is maintained by a network of computers instead of a single entity, making it highly resistant to hacking and data breaches. By providing greater security, transparency and efficiency, blockchain technology can help to create a more equitable and sustainable world.Blockchain technology has the potential to help mankind in various ways, some of which include but are not limited to: Decentralization and Transparency: Blockchain technology allows for decentralization of data and transactions, making them more transparent and accountable. This is particularly important in fields such as finance, where trust and transparency are critical. Increased Security: Blockchain technology is inherently secure due to its distributed nature, making it very difficult for hackers to compromise the system. This makes it an ideal solution for data and information storage, particularly in areas such as health and finance, where privacy and security are of utmost importance. Faster Transactions: Blockchain technology eliminates the need for intermediaries, reducing the time and cost associated with transactions. This makes it an ideal solution for international trade, remittances and other types of financial transactions, especially in parts of the world where a great number of individuals do not have access to basic banking services. Immutable Record: One of the fundamental attributes of blockchain is its immutability. Once data is added to the blockchain, it becomes nearly impossible to alter or delete. This feature ensures a tamper-resistant and reliable record of transactions, crucial for maintaining integrity in various industries, including supply chain management and legal documentation. Smart Contracts: Blockchain technology supports the implementation of smart contracts, which are self-executing contracts with the terms of the agreement directly written into code. This automation streamlines processes and reduces the risk of fraud, particularly in sectors like real estate and legal agreements. Interoperability: Blockchain's ability to facilitate interoperability allows different blockchain networks to communicate and share information seamlessly. This attribute is pivotal for creating a unified and interconnected ecosystem, especially as various industries adopt blockchain independently. Interoperability enhances efficiency, reduces redundancy and fosters collaboration across diverse sectors. Leveraging Blockchain Technology: Governance, Risk, Compliance, Security, and Benevolent Use Cases discusses various governance, risk and control (GRC) and operational risk-related considerations in a comprehensive, yet non-technical, way to enable business leaders, managers and professionals to better understand and appreciate its various potential use cases. This book is also a must-read for leaders of non-profit organizations, allowing them to further democratize needs that we often take for granted in developed countries around the globe, such as access to basic telemedicine, identity management and banking services.

9 特價3338
立即代訂
下次再買

Future Access Enablers for Ubiquitous and Intelligent Infrastructures

Springer 出版
2024/10/17 出版

This book constitutes the refereed post-conference proceedings of the 8th EAI International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2024, held in Zagreb, Croatia, during May 9-10, 2024. The 14 full papers were carefully reviewed and selected from 35 submissions. The papers are organized in thematic sessions on: Future access networks, Sustainable Communications Computing Infrastructures, Environment Applications Scenarios.

9 特價3392
貨到通知
下次再買

Secret History

CRC Press 出版
2024/10/16 出版

Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author--a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History--includes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigen癡re cipher, the one-time pad, transposition ciphers, Jefferson's cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing.With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field.Please visit Dr. Bauer's website, which provides access to exercise sets: http: //depts.ycp.edu/ cbauer/

9 特價3529
立即代訂
下次再買

Security and Privacy in Communication Networks

Haixin,Duan  著
Springer 出版
2024/10/16 出版

This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.

9 特價4769
立即代訂
下次再買

ISO 27001 Controls

Itgp 出版
2024/10/16 出版

Following the success of the first edition, this book has been re-released to reflect the ISO/IEC 27001:2022 and ISO/IEC 27002:2022 updates.Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001:2022 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001:2022. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001:2022.The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit.This guide is intended to be used by those involved in: - Designing, implementing and/or maintaining an ISMS;- Preparing for ISMS audits and assessments; or- Undertaking both internal and third-party ISMS audits and assessments.

9 特價2322
立即代訂
下次再買

Learning PyTorch 2.0, Second Edition

Gitforgits 出版
2024/10/16 出版

"Learning PyTorch 2.0, Second Edition" is a fast-learning, hands-on book that emphasizes practical PyTorch scripting and efficient model development using PyTorch 2.3 and CUDA 12. This edition is centered on practical applications and presents a concise methodology for attaining proficiency in the most recent features of PyTorch. The book presents a practical program based on the fish dataset which provides step-by-step guidance through the processes of building, training and deploying neural networks, with each example prepared for immediate implementation. Given your familiarity with machine learning and neural networks, this book offers concise explanations of foundational topics, allowing you to proceed directly to the practical, advanced aspects of PyTorch programming. The key learnings include the design of various types of neural networks, the use of torch.compile() for performance optimization, the deployment of models using TorchServe, and the implementation of quantization for efficient inference. Furthermore, you will also learn to migrate TensorFlow models to PyTorch using the ONNX format. The book employs essential libraries, including torchvision, torchserve, tf2onnx, onnxruntime, and requests, to facilitate seamless integration of PyTorch with production environments.Key LearningsMaster tensor manipulations and advanced operations using PyTorch's efficient tensor libraries.Build feedforward, convolutional, and recurrent neural networks from scratch.Implement transformer models for modern natural language processing tasks.Use CUDA 12 and mixed precision training (AMP) to accelerate model training and inference.Deploy PyTorch models in production using TorchServe, including multi-model serving and versioning.Migrate TensorFlow models to PyTorch using ONNX format for seamless cross-framework compatibility.Optimize neural network architectures using torch.compile() for improved speed and efficiency.Utilize PyTorch's Quantization API to reduce model size and speed up inference.Setup custom layers and architectures for neural networks to tackle domain-specific problems.Monitor and log model performance in real-time using TorchServe's built-in tools and configurations.Table of ContentIntroduction To PyTorch 2.3 and CUDA 12Getting Started with TensorsBuilding Neural Networks with PyTorchTraining Neural NetworksAdvanced Neural Network ArchitecturesQuantization and Model OptimizationMigrating TensorFlow to PyTorchDeploying PyTorch Models with TorchServe

9 特價2363
立即代訂
下次再買

Digital Twin

CRC Press 出版
2024/10/15 出版

The digital twin of a physical system is an adaptive computer analog which exists in the cloud and adapts to changes in the physical system dynamically. This book introduces the computing, mathematical, and engineering background to understand and develop the concept of the digital twin. It provides background in modeling/simulation, computing technology, sensor/actuators, and so forth, needed to develop the next generation of digital twins. Concepts on cloud computing, big data, IoT, wireless communications, high-performance computing, and blockchain are also discussed. Features: Provides background material needed to understand digital twin technology Presents computational facet of digital twin Includes physics-based and surrogate model representations Addresses the problem of uncertainty in measurements and modeling Discusses practical case studies of implementation of digital twins, addressing additive manufacturing, server farms, predictive maintenance, and smart cities This book is aimed at graduate students and researchers in Electrical, Mechanical, Computer, and Production Engineering.

9 特價2957
立即代訂
下次再買

Introduction to Confidential Computing

Praveenraj,R  著
2024/10/15 出版

DESCRIPTION In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats.Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It explains why confidential computing is crucial for protecting sensitive data, covering key technologies, architectures, and frameworks. The book details remote attestation, which ensures computing environment integrity, and explores how confidential computing enhances AI training security. It also reviews solutions from major cloud providers, helping readers choose the right options. This book is perfect for anyone looking to boost their cybersecurity skills and stay ahead in data protection.By the end of this book, you will gain a thorough understanding of confidential computing and its impact on data security and privacy. You will be ready to assess and implement confidential computing solutions, safeguarding your organization's assets and meeting data privacy regulations.WHAT YOU WILL LEARN● Learn why confidential computing is crucial in today's digital world.● Understand high-level architecture of various trusted execution environments implementations.● Art of developing secure applications that can be deployed on TEE.● Comprehend how remote attestation ensures the integrity of computing environments.● Discover how RA-TLS could reshape the future of secure communications. ● Explore how confidential computing protects data and AI models.WHO THIS BOOK IS FORThis book is for software architects, security researchers, and developers to enhance application security using confidential computing. PhD candidates and postgraduates will explore TEEs, while AI/ML developers will understand how confidential AI protects data and models.

9 特價1056
立即代訂
下次再買

The Zero Trust Framework

Ravindra,Das  著
CRC Press 出版
2024/10/14 出版

The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning.Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things.So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA).In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.

9 特價1192
立即代訂
下次再買

Emerging Technologies and the Indian IT Sector

CRC Press 出版
2024/10/14 出版

This book examines the implementation of emerging technology projects in the service-based Indian IT sector. The title shows how emerging technologies impact IT-enabled Services (ITeS) organizations and examines the mobility prospects for engineers and students looking to enter the Indian IT sector. Indian IT, dominated by organizations offering ITeS, provides services to clients across the world. Fueling this sector's growth are engineering graduates. Emerging technologies, such as AI, Big Data, Cloud, and Blockchain, have brought the IT and engineering education sectors to a crossroads with global implications. The IT sector is facing growing demands for new technology solutions from its clients, and it is engineering students who are expected to upskill in order to build these solutions. The volume provides a rare, bottom-up look at the intersection of technology, education and organizational structure, based on an ethnographic study.Emerging Technologies and the Indian IT Sector will be a helpful and unique resource for managers in ITeS grappling with emerging technologies, researchers looking at how emerging technologies impact organizations and for those developing innovative IT courses in higher education. Readers interested in the global structure of IT education and industry will also find a fresh, ethnographically-informed take on these issues.

9 特價2813
立即代訂
下次再買

Research Advances in Intelligent Computing

Anshul,Verma  著
CRC Press 出版
2024/10/14 出版

Since the invention of computers and other similar machines, scientists and researchers have been trying very hard to enhance their capabilities to perform various tasks. As a result, the capabilities of computers are growing exponentially day by day in terms of diverse working domains, versatile jobs, processing speed, and reduced size. Now, we are in the race to make these machines as intelligent as human beings. Artificial intelligence (AI) came up as a way of making a computer or computer software think in a similar manner to the way that humans think. AI is inspired by the study of human brain, including how humans think, learn, decide, and act while trying to solve a problem. The outcomes of this study are the basis of developing intelligent software and systems or intelligent computing (IC). An IC system has the capabilities of reasoning, learning, problem-solving, perception, and linguistic intelligence. IC systems consist of AI techniques as well as other emerging techniques that make a system intelligent. The use of IC has been seen in almost every sub-domain of computer science such as networking, software engineering, gaming, natural language processing, computer vision, image processing, data science, robotics, expert systems, and security. Nowadays, IC is also useful for solving various complex problems in diverse domains such as for predicting disease in medical science, predicting land fertility or crop productivity in agricultural science, predicting market growth in economics, and weather forecasting. For all these reasons, this book presents the advances in AI techniques, under the umbrella of IC. In this context, the book includes recent research that has been done in the areas of machine learning, neural networks, deep learning, evolutionary algorithms, genetic algorithms, swarm intelligence, fuzzy systems, and so on. This book discusses recent theoretical, algorithmic, simulation, and implementation-based advancements related to IC.

9 特價2861
立即代訂
下次再買

AI for Big Data-Based Engineering Applications from Security Perspectives

CRC Press 出版
2024/10/14 出版

Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input and using those inputs to generate new rules for future business analytics. AI and machine learning are now giving us new opportunities to use big data that we already had, as well as unleash a whole lot of new use cases with new data types. With the increasing use of AI dealing with highly sensitive information such as healthcare, adequate security measures are required to securely store and transmit this information. This book provides a broader coverage of the basic aspects of advanced circuits design and applications.AI for Big Data-Based Engineering Applications from Security Perspectives is an integrated source that aims at understanding the basic concepts associated with the security of advanced circuits. The content includes theoretical frameworks and recent empirical findings in the field to understand the associated principles, key challenges, and recent real-time applications of advanced circuits, AI, and big data security. It illustrates the notions, models, and terminologies that are widely used in the area of Very Large Scale Integration (VLSI) circuits, security, identifies the existing security issues in the field, and evaluates the underlying factors that influence system security. This work emphasizes the idea of understanding the motivation behind advanced circuit design to establish the AI interface and to mitigate security attacks in a better way for big data. This book also outlines exciting areas of future research where already existing methodologies can be implemented. This material is suitable for students, researchers, and professionals with research interest in AI for big data-based engineering applications, faculty members across universities, and software developers.

9 特價2861
立即代訂
下次再買

Social Media Strategy

2024/10/14 出版

Social Media Strategy: Algorithms That Work for You Social Media Strategy: Algorithms That Work for You Social Media Strategy: Algorithms That Work for You Social Media Strategy: Algorithms That Work for You

9 特價3780
立即代訂
下次再買

Cloud Computing, Big Data and Emerging Topics

Springer 出版
2024/10/12 出版

This volume CCIS 2189 constitutes the refereed proceedings of the 12th Conference, JCC-BD&ET 2024, held in La Plata, Argentina during June 25-27, 2024. The 12 full papers presented were carefully reviewed and selected from 37 submissions. They were categorized under the topical sections as follows: Parallel and Distributed Computing, Machine and Deep Learning, Smart Cities and E-Government, Visualization, Emerging Topics, Innovation in Computer Science Education, Computer Security.

9 特價5723
立即代訂
下次再買

Machine Learning

Hosanee  著
Yeehos 出版
2024/10/12 出版

For sales in India check Indian online stores.Thank you for being part of the technological world through the reading.Machine Learning as well as programming remains challenging both to teach and learn. In this book, 10 classifiers are taught with their practical codes. The examples show the difference which happen when the 10 classifiers are used. The books also offers basic understanding of programming first before proceeding to machine learning.Book is of A5 size which makes it handy for scholars or novice learners who want to have a theoretical exposure.

9 特價252
立即代訂
下次再買

Better Onboarding

Krystal Higgins 出版
2024/10/11 出版

When users try your product or service for the first time, what encourages them to come back? Onboarding can make the difference between abandoned accounts and devoted use-if we design it as a holistic, ongoing process.Krystal Higgins demonstrates how the best onboarding experiences guide people as they interact, helping them follow their own path to success. Gain practical strategies and techniques for designing effective guidance, whether you're working through a redesign, launching new features, rolling out service updates, or welcoming back returning users. Set aside the tutorials, manuals, and intrusive instructions of the past, and learn how to use guided interaction to help users find their way-and get value out of every step.THIS BOOK EXPLORES: How to effectively greet, engage, and retain customersBest practices for mapping users' onboarding journeys from start to finishBringing research, content, design, and functionality together to support new usersSteps for breaking down onboarding actions for more efficient implementationTechniques for embedding guidance in the context of the full product experience

9 特價851
立即代訂
下次再買

Cybersecurity Simplified

2024/10/10 出版

In today's interconnected world, cybersecurity is no longer optional-it's a necessity. Cybersecurity Simplified offers a clear and comprehensive guide to understanding the complexities of cybersecurity, tailored for those new to the field. Whether you're a student, job seeker, or an IT professional looking to broaden your expertise, this book will equip you with the essential knowledge and skills to protect digital environments from ever-evolving threats. Starting with the historical evolution of cybersecurity, the book covers critical topics such as the CIA triad, network security, and the various forms of cyber threats including malware, phishing, and advanced persistent threats (APTs).What will you learn?This book is designed to provide you with: Insight into Cyber Threats: Learn about various cyber threats ranging from traditional malware and phishing to sophisticated attacks like ransomware and advanced persistent threats (APTs). Discover how these threats impact individuals, organizations, and global security.Practical Applications of Cybersecurity: Dive into real-world scenarios and case studies that demonstrate how cybersecurity strategies are applied across different industries and sectors.The Role of Artificial Intelligence: Explore how AI is revolutionizing cybersecurity, from enhancing predictive analytics and anomaly detection to automating threat responses. You'll also examine the ethical implications and challenges that come with integrating AI into cybersecurity practices.Hands-On Experience: Engage in a practical project that guides you through implementing a cybersecurity solution using Python or another programming language. This hands-on experience will solidify your theoretical knowledge and build your confidence in applying cybersecurity concepts in real-world environments.Table of ContentsIntroduction to CybersecurityThe Importance of Cybersecurity Understanding Cyber ThreatsCybersecurity FundamentalsNetwork SecurityApplication SecurityData SecurityCybersecurity in the CloudArtificial Intelligence in CybersecurityFuture Trends in Cybersecurity Practical Application

9 特價1286
立即代訂
下次再買

A Reference Manual for Data Privacy Laws and Cyber Frameworks

Ravindra,Das  著
CRC Press 出版
2024/10/10 出版

In this book we detail the tenets and provisions of three key Data Privacy Laws. We also provide a general framework at the end as to how a business can come into compliance with these various Data Privacy Laws.

9 特價6678
立即代訂
下次再買

From Street-Smart to Web-Wise(r)

Al,Marcella  著
CRC Press 出版
2024/10/10 出版

"From Street-smart to Web-wise(R) A Safety Training Manual Built for Teachers and Designed for Children," isn't just another book-it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.

9 特價6678
立即代訂
下次再買

From Street-Smart to Web-Wise(r)

Al,Marcella  著
CRC Press 出版
2024/10/10 出版

"From Street-smart to Web-wise(R) A Safety Training Manual Built for Teachers and Designed for Children," isn't just another book-it's a passionate call to action for teachers, a roadmap to navigate the digital landscape safely, with confidence and care.

9 特價2861
立即代訂
下次再買

Ai-Enabled Spectrum Sharing

Lin,Zhang  著
Springer 出版
2024/10/10 出版
9 特價2623
立即代訂
下次再買

A Reference Manual for Data Privacy Laws and Cyber Frameworks

Ravindra,Das  著
CRC Press 出版
2024/10/09 出版

In this book we detail the tenets and provisions of three key Data Privacy Laws. We also provide a general framework at the end as to how a business can come into compliance with these various Data Privacy Laws.

9 特價2861
立即代訂
下次再買

Phishing for Answers

Terry R,Merz  著
2024/10/09 出版

In the context of information security, social engineering is the manipulation of people into performing actions or divulging information for the purpose of gathering, defrauding, or gaining unauthorized system access. While some of the most common forms of social engineering involve telephone or social networks where criminals pose as employees of targeted organizations, phishing accounts for 96% of all successful cyber-attacks. Governments and private organizations have responded through various means such as training employees, executing internal vulnerability assessments, and ad campaigns. Despite all these efforts, phishing continues to provide the primary cyber-attack vector for nefarious entities. Phishing attacks continue to escalate, with over 300,000 reported incidents in the US alone last year. This book provides an in-depth look at the anatomy of modern phishing threats and how they are evolving with AI technologies. Readers will learn about the latest social engineering tactics used by cybercriminals, including deepfakes for audio/video manipulation and AI-generated spear-phishing campaigns, and discover emerging defensive tools that leverage machine learning to detect anomalies and protect against hyper-personalized phishing attempts. With phishing losses averaging millions per breach, this book equips readers with the knowledge to identify risks and implement robust countermeasures as these attacks become increasingly sophisticated and difficult to spot. Written by two experts in the field, bringing together their wide experience in academic research, security engineering, incident response and cyber forensics, this book offers valuable insights for researchers, engineers, cybersecurity professionals and organizational leaders working in cyber security, information technology, network and infrastructure security, endpoint protection, data governance, risk and compliance, digital forensics, incident response, operational technology and industrial control systems.

9 特價5535
立即代訂
下次再買

The Art of Cyber Defense

CRC Press 出版
2024/10/09 出版

The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.

9 特價6678
立即代訂
下次再買

Church Privacy Team

Nad Publishing 出版
2024/10/06 出版
9 特價1904
立即代訂
下次再買

Mastering Honeypots

2024/10/05 出版

DESCRIPTION Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future attacks.This book simplifies the concept of honeypots, which are important tools in cybersecurity. The book explains their history, types, and how to design and use them effectively. It includes practical advice on setting up honeypots, monitoring them, and analyzing attacks. It also offers strategies for blue team professionals, like SOC analysts, to improve defenses and serves as a helpful resource for purple team members to practice detecting attacks. Additionally, it discusses how honeypots contribute to threat intelligence and cybersecurity training, including new ideas like quantum honeypots, preparing professionals to face modern cyber threats.By the end of this book, you will be able to effectively deploy and manage honeypots, analyze attack data, and implement strategies to protect your organization from malicious attacks.KEY FEATURES ● Design and deployment of honeypot to trap hackers.● Step-by-step guide for implementation with best practices.● Quantum insights and threat anticipation for future-proof defense.WHAT YOU WILL LEARN● Acquire an understanding of honeypot technology, from foundational concepts to advanced techniques.● Learn how to design and implement honeypots tailored to specific security needs and threat landscapes.● Effectively monitor and analyze honeypot data to detect and respond to attacks.● Explore advanced honeypot techniques, such as honeypot farms and distributed honeypot networks.WHO THIS BOOK IS FORThis book is a vital resource for CTOs, CISOs, InfoSec managers, InfoSec analysts, and network admins. This book will help students and researchers who are working in the domain of cybersecurity.

9 特價1606
立即代訂
下次再買

Cryptology and Network Security

Springer 出版
2024/10/04 出版

This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024. The 25 papers included in these volumes were carefully reviewed and selected from 76 submissions. The papers presented in these two volumes are organized in the following topical sections: - Part I: Multi-party Computation; Post-quantum Security; Anonymity and Privacy; Blockchain Technology. Part II: Cyber Security and Leakage; Machine Learning and Security; Provable Security; Cryptanalysis.

9 特價3577
立即代訂
下次再買

Generative AI and Cyberbullying

Ravindra,Das  著
CRC Press 出版
2024/10/03 出版

Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly. For example, not only is the near-99% remote workforce now a reality, but businesses today are taking incident response and disaster recovery much more seriously these days as well. But another area that has blossomed in the last couple of years has been that of Generative AI. It is actually a subfield of artificial intelligence, which has been around since the 1950s.But Gen AI (as it is also called) has been fueled by the technology of ChatGPT, which has been developed and created by OpenAI. Given the GPT4 algorithms Gen AI is powered by, an end user can merely type in, or even speak into the platform a query, and an output that is specific to that query will be automatically generated. The answer (or "output") can be given as a text, video, image, or even an audio file.The scalability and diversity of Gen AI has allowed it to be used in a myriad of industries and applications. But although it has been primarily designed to serve the greater good, it can also be used for very nefarious purposes, such as online harassment and Cyberbullying.In this particular book, we actually take the good side of Gen AI and provide an overview as to how it can be used to help combat Cyberbullying. This book is broken down into the following topics: What Cyberbullying is all about How Gen AI can be used to combat Cyberbullying An overview into Gen AI Advanced topics into Gen AI Conclusions

9 特價6678
立即代訂
下次再買

The Ciso Playbook

CRC Press 出版
2024/10/03 出版

The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow.

9 特價6678
立即代訂
下次再買

Serious Cryptography, 2nd Edition

No Starch Press 出版
2024/10/03 出版

Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understanding modern crypto. This thoroughly revised and updated edition of the bestselling introduction to modern cryptography breaks down fundamental mathematical concepts without shying away from meaty discussions of how they work. In this practical guide, you'll gain immeasurable insight into topics like authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. You'll find coverage of topics like: The basics of computational security, attacker models, and forward secrecyThe strengths and limitations of the TLS protocol behind HTTPS secure websitesQuantum computation and post-quantum cryptographyHow algorithms like AES, ECDSA, Ed25519, Salsa20, and SHA-3 workAdvanced techniques like multisignatures, threshold signing, and zero-knowledge proofsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. And, true to form, you'll get just enough math to show you how the algorithms work so that you can understand what makes a particular solution effective--and how they break. NEW TO THIS EDITION: This second edition has been thoroughly updated to reflect the latest developments in cryptography. You'll also find a completely new chapter covering the cryptographic protocols in cryptocurrency and blockchain systems. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will demystify this often intimidating topic. You'll grow to understand modern encryption and its applications so that you can make better decisions about what to implement, when, and how.

9 特價1890
立即代訂
下次再買

Generative AI and Cyberbullying

Ravindra,Das  著
CRC Press 出版
2024/10/02 出版

Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly. For example, not only is the near-99% remote workforce now a reality, but businesses today are taking incident response and disaster recovery much more seriously these days as well. But another area that has blossomed in the last couple of years has been that of Generative AI. It is actually a subfield of artificial intelligence, which has been around since the 1950s.But Gen AI (as it is also called) has been fueled by the technology of ChatGPT, which has been developed and created by OpenAI. Given the GPT4 algorithms Gen AI is powered by, an end user can merely type in, or even speak into the platform a query, and an output that is specific to that query will be automatically generated. The answer (or "output") can be given as a text, video, image, or even an audio file.The scalability and diversity of Gen AI has allowed it to be used in a myriad of industries and applications. But although it has been primarily designed to serve the greater good, it can also be used for very nefarious purposes, such as online harassment and Cyberbullying.In this particular book, we actually take the good side of Gen AI and provide an overview as to how it can be used to help combat Cyberbullying. This book is broken down into the following topics: What Cyberbullying is all about How Gen AI can be used to combat Cyberbullying An overview into Gen AI Advanced topics into Gen AI Conclusions

9 特價1573
立即代訂
下次再買

The Scaling Era

Stripe Press 出版
2024/10/02 出版

An inside view of the AI revolution, from the people and companies making it happen. How did we build large language models? How do they think, if they think? What will the world look like if we have billions of AIs that are as smart as humans, or even smarter? In a series of in-depth interviews with leading AI researchers and company founders--including Anthropic CEO Dario Amodei, DeepMind cofounder Demis Hassabis, OpenAI cofounder Ilya Sutskever, MIRI cofounder Eliezer Yudkowsky, and Meta CEO Mark Zuckerberg--Dwarkesh Patel provides the first comprehensive and contemporary portrait of the technology that is transforming our world. Drawn from his interviews on the Dwarkesh Podcast, these curated excerpts range from the technical details of how LLMs work to the possibility of an AI takeover or explosive economic growth. Patel's conversations cut through the noise to explore the topics most compelling to those at the forefront of the field: the power of scaling, the potential for misalignment, the sheer input required for AGI, and the economic and social ramifications of superintelligence. The book is also a standalone introduction to the technology. It includes over 170 definitions and visualizations, explanations of technical points made by guests, classic essays on the theme from other writers, and unpublished interviews with Open Philanthropy research analyst Ajeya Cotra and Anthropic cofounder Jared Kaplan. The Scaling Era offers readers unprecedented insight into a transformative moment in the development of AI--and a vision of what comes next.

9 特價1197
立即代訂
下次再買
頁數23/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing