Cybersecurity Issues in Emerging Technologies
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning.This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
Privacy and Security Challenges in Cloud Computing
This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects.The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing.The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.
A Brief History of Cyberspace
With the Internet, a new space, cyberspace, has formed, been rapidly integrated into daily life, and become the fourth living space for human beings. Cyberspace is the digital world created based on traditional physical, social, and thinking spaces (PST). The book explores cyberspace's history philosophy, science, and technology.
Cyber Security and Operations Management for Industry 4.0
This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0.Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed.This book is ideal for industry professionals, researchers, and those in academia who are interested in learning more about how cyber security and Industry 4.0 are related and can work together.
Security and Privacy Trends in Cloud Computing and Big Data
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, high computation power, and distributed capability to support processing of big data. In such an integrated environment the security and privacy concerns involved in both technologies become combined.This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration. It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data. Readers can get a better understanding of the basics of cloud computing, big data, and security mitigation techniques to deal with current challenges as well as future research opportunities.
Urban Analytics with Social Media Data
The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics.  
5G Cyber Risks and Mitigation
5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key role in mitigating these risks.
Modeling the Power Consumption and Energy Efficiency of Telecommunications Networks
This book introduces the technical foundations and tools for estimating the power consumption of internet networks including a detailed description of how these models are constructed and applied.
Occupy the Cyberspace
The central idea is 'the future.' The analysis reveals the fact that uncertainty shall never be an enemy to thinkers and scholars; in contrast, to critically question the past and the present will lead to developing 'alternative futures.' The future is made not predicted. In addition, the problem with mainstream future writings is that they are not inclusive. The content is focusing on asking 'who is missing?' to ensure bringing to the conversation all the vulnerable and unheard voices and perspectives. Then, there is the discourse describing the issue or the phenomena; this discourse in itself could be the problem. Futurists seek analyzing the varied discourses across times and actors. Finally, the myth or metaphor as a deeply-rooted thoughts and believes within any culture that shape and direct the overall discussion of any topic. Behind these myths and metaphors, the researchers shall reach the 'why' regarding the past and the present of the issue, allowing them to open new vertical and horizontal paths for the future. This theoretical framework is applied to online social networking sites, specifically as a public sphere within the Egyptian context.
Securing Iot and Big Data
This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader.
Industrial Internet of Things Security
The industrial landscape and global society are changing rapidly, driven by the growing adoption of the Industrial Internet of Things (IIoT) and Artificial Intelligence (AI) technologies. As IIoT and AI become more pervasive, they also offer new security risks that must be addressed to ensure the reliability and safety of critical systems.
Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints
This book presents up-to-date research developments and novel methodologies regarding recursive filtering for 2-D shift-varying systems with various communication constraints. It investigates recursive filter/estimator design and performance analysis by a combination of intensive stochastic analysis, recursive Riccati-like equations, variance-constrained approach, and mathematical induction. Each chapter considers dynamics of the system, subtle design of filter gains, and effects of the communication constraints on filtering performance. Effectiveness of the derived theories and applicability of the developed filtering strategies are illustrated via simulation examples and practical insight.Features: - Covers recent advances of recursive filtering for 2-D shift-varying systems subjected to communication constraints from the engineering perspective. Includes the recursive filter design, resilience operation and performance analysis for the considered 2-D shift-varying systems. Captures the essence of the design for 2-D recursive filters. Develops a series of latest results about the robust Kalman filtering and protocol-based filtering. Analyzes recursive filter design and filtering performance for the considered systems. This book aims at graduate students and researchers in mechanical engineering, industrial engineering, communications networks, applied mathematics, robotics and control systems.
Security Awareness Design in the New Normal Age
This book will primarily consider the problem of hitting that 'Sweet Spot' in the age of 'New Normal working', where knowledge about secure practice is not only understood and remembered, but also reliably put into practice - even when working alone. This will be informed by academic research as well as professional experience.
Entropy Randomization in Machine Learning
Entropy Randomization in Machine Learning presents a new approach to machine learning--entropy randomization--to obtain optimal solutions under uncertainty (uncertain data and models of the objects under study). Randomized machine-learning procedures involve models with random parameters and maximum entropy estimates of the probability density functions of the model parameters under balance conditions with measured data. Optimality conditions are derived in the form of nonlinear equations with integral components. A new numerical random search method is developed for solving these equations in a probabilistic sense. Along with the theoretical foundations of randomized machine learning, Entropy Randomization in Machine Learning considers several applications to binary classification, modelling the dynamics of the Earth's population, predicting seasonal electric load fluctuations of power supply systems, and forecasting the thermokarst lakes area in Western Siberia. Features- A systematic presentation of the randomized machine-learning problem: from data processing, through structuring randomized models and algorithmic procedure, to the solution of applications-relevant problems in different fields - Provides new numerical methods for random global optimization and computation of multidimensional integrals- A universal algorithm for randomized machine learningThis book will appeal to undergraduates and postgraduates specializing in artificial intelligence and machine learning, researchers and engineers involved in the development of applied machine learning systems, and researchers of forecasting problems in various fields.
Recent Trends in Blockchain for Information Systems Security and Privacy
The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry.
Internet of Medical Things
Internet of Things (IoT) has become a valuable tool for connection and information exchange between devices. This book provides a brief introduction to this new field, focuses on wearable medical devices, and covers the basic concepts by providing the reader with enough information to solve various practical problems.This book provides the latest applications, experiments, fundamentals concepts, and cutting-edge topics for the ehealth and wearable devices field. The book also offers topics related to Security in IoT and Wearable Devices, Wearable Devices and Internet of Medical Devices (IoMT), IoT for Medical Applications, and Tools and study cases.The book brings new and valuable information to PhD researchers, students, professors, and professionals working in IoT and related fields.
Designing Secure Systems
Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms.Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model.We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover."Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.
Opportunistic Networks
This book provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks.
The Internet of Mechanical Things
This book provides knowledge, skills, and strategies an engineer requires to effectively integrate Internet of Things (IoT) into the field of mechanical engineering. Divided into three sections named IoT Strategies, IoT Foundation topics, and IoT system development, the volume covers introduction to IoT framework, its components, advantages, challenges, and practical process for effective implementation of IoT from mechanical engineering perspective. Further, it explains IoT systems and hands-on training modules, implementation, and execution of IoT Systems. Features: Presents exclusive material on application of IoT in mechanical engineering. Combines theory and practice including relevant terminologies and hands-on. Emphasis on use of IoT to streamline operations, reduce costs, and increased profits. Focusses on development and implementation of Raspberry Pi and Arduino based IoT systems. Illustrates use IoT data to improve performance of robots, machines, and systems. This book aims at Researchers, Graduate students in Mechanical Engineering, Computer Programming, Automobile, Robotics, and Industry 4.0/automation.
Secure Edge Computing
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept to address the challenges associated with IoE that facilitates data analysis at the edge of the network.
Idiomatic Rust
Tips, tricks, design patterns, and secret features of Rust that will help you build stable and maintainable applications. Whether you're a Rust beginner or a pro, Idiomatic Rust will teach you to be a better Rust programmer. It introduces essential design patterns for Rust software with detailed explanations, and code samples that encourage you to get stuck in. In Idiomatic Rust you'll learn how to apply important design patterns including: - Fluent interfaces for creating delightful APIs - The Builder pattern to encapsulate data and perform initialization - Immutable data structures that help you avoid hard-to-debug data race conditions - Functional programming patterns - Anti-patterns and what not to do in Rust Idiomatic Rust catalogs, documents, and describes both how classic design patterns work with Rust, and the new Rust-specific patterns that will help you master the language. Each pattern or best practice helps solve common programming problems and ensure your code is easy for others to understand. You'll learn when to use each pattern--and when to break it! You'll soon be producing higher-quality Rust code and higher-quality Rust software. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications About the technology After you're comfortable with Rust's syntax and its uniquely-powerful compiler, there's a whole new dimension to explore as you put it to use in real projects. How do you apply standard design patterns in Rust applications? Where and why should you use IntoIterator? Why do Rustaceans love the PhantomData type? This book answers these questions and many, many more. About the book Idiomatic Rust introduces the coding and design patterns you'll need to take advantage of Rust's unique language design. This book's clear explanations and reusable code examples help you explore metaprogramming, build your own libraries, create fluent interfaces, and more. Along the way, you'll learn how to write efficient, idiomatic Rust code that's easy to maintain and evolve as you learn how the language works under the hood. What's inside - Creating delightful APIs - Applying Builder and other classic design patterns - Functional programming patterns - Rust anti-patterns About the reader For intermediate Rust programmers. About the author Brenden Matthews is a member of the Apache Software Foundation, creator of the system monitor Conky, and author of Code Like a Pro in Rust. The technical editor on this book was Alain M Couniot. Table of Contents PART 1 1 Rust-y patterns 2 Rust's basic building blocks 3 Code flow PART 2 4 Introductory patterns 5 Design patterns: Beyond the basics 6 Designing a library PART 3 7 Using traits, generics, and structs for specialized tasks 8 State machines, coroutines, macros, and preludes PART 4 9 Immutability 10 Antipatterns A Installing Rust
Building AI Applications with OpenAI APIs - Second Edition
Improve your app development skills by building a ChatGPT clone, code bug fixer, quiz generator, translation app, email auto-reply, PowerPoint generator, and moreKey Features: - Transition into an expert AI developer by mastering ChatGPT concepts, including fine-tuning and integrations- Gain hands-on experience through real-world projects covering a wide range of AI applications- Implement payment systems in your applications by integrating the ChatGPT API with Stripe- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Unlock the power of AI in your applications with ChatGPT with this practical guide that shows you how to seamlessly integrate OpenAI APIs into your projects, enabling you to navigate complex APIs and ensure seamless functionality with ease.This new edition is updated with key topics such as OpenAI Embeddings, which'll help you understand the semantic relationships between words and phrases. You'll find out how to use ChatGPT, Whisper, and DALL-E APIs through 10 AI projects using the latest OpenAI models, GPT-3.5, and GPT-4, with Visual Studio Code as the IDE. Within these projects, you'll integrate ChatGPT with frameworks and tools such as Flask, Django, Microsoft Office APIs, and PyQt. You'll get to grips with NLP tasks, build a ChatGPT clone, and create an AI code bug-fixing SaaS app. The chapters will also take you through speech recognition, text-to-speech capabilities, language translation, generating email replies, creating PowerPoint presentations, and fine-tuning ChatGPT, along with adding payment methods by integrating the ChatGPT API with Stripe.By the end of this book, you'll be able to develop, deploy, and monetize your own groundbreaking applications by harnessing the full potential of ChatGPT APIs.What You Will Learn: - Develop a solid foundation in using the OpenAI API for NLP tasks- Build, deploy, and integrate payments into various desktop and SaaS AI applications- Integrate ChatGPT with frameworks such as Flask, Django, and Microsoft Office APIs- Unleash your creativity by integrating DALL-E APIs to generate stunning AI art within your desktop apps- Experience the power of Whisper API's speech recognition and text-to-speech features- Find out how to fine-tune ChatGPT models for your specific use case- Master AI embeddings to measure the relatedness of text stringsWho this book is for: This book is for a diverse range of professionals, including programmers, entrepreneurs, and software enthusiasts. Beginner programmers, Python developers exploring AI applications with ChatGPT, software developers integrating AI technology, and web developers creating AI-powered web applications with ChatGPT will find this book beneficial. Scholars and researchers working on AI projects with ChatGPT will also find it valuable. Basic knowledge of Python and familiarity with APIs is needed to understand the topics covered in this book.Table of Contents- Getting Started with the ChatGPT API for NLP Tasks- Building a ChatGPT Clone- Creating and Deploying a Code Bug-Fixing Application Using Flask- Integrating the Code Bug-Fixing Application with a Payment Service- Quiz Generation App with ChatGPT and Django- Language Translation Desktop App with the ChatGPT API and Microsoft Word- Building an Outlook Email Reply Generator- Essay Generation Tool with PyQt and the ChatGPT API- Integrating the ChatGPT and DALL-E APIs: Building an End-to-End PowerPoint Presentation Generator- Speech Recognition and Text-to-Speech with the Whisper API- Choosing the Right ChatGPT API Model- Fine-Tuning ChatGPT to Create Unique API Models
The Convergence of Internet of Things and Cloud for Smart Computing
This book presents the know-how of the real-time IoT application development activity including a basic understanding of the IoT architecture, use cases, smart computing, and the associated challenges in design and development of the IoT system. All the technical details related to protocol stack, technologies, and platforms used for the implementation are explained. It further includes techniques and case studies that include smart computing on the IoT-Cloud models along with test beds for experimentation purposes. The book aims at setting up the groundwork for the creation of applications that can help make day-to-day tasks simpler by meeting the needs of varied sectors like education, health care, agriculture, and so forth.Features: Covers IoT cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-Cloud convergence architectures and its fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context-aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of Cloud in an IoT application This book aims at graduate students, researchers, and professionals getting started in the IoT field
Safer @ Home with pfSense(R)
You no longer need to risk your security and privacy on consumer-grade security products. Book DescriptionpfSense(R) is a powerful, commercial-grade firewall that provides capabilities far beyond what you can get in consumer products. This book will walk you through setting up your pfSense(R) firewall with many easy-to-follow recipes, depending on your needs. What you will learn* Blocking malware, phishing and malicious sites and countries* Hiding your DNS traffic from ISP snooping* Reducing the burden that advertising has on your browsing* Isolating your vulnerable IoT devices using VLANs* Setting up your firewall to provide you with reports on matters that need your attention* Resolving buffer bloat to maximize your internet connection* Enabling remote access using VPNs* Managing, documenting, updating and backing up your firewall configuration Who this book is forThis book is for those with an introductory understanding of networking, at least networking terms like subnets. Prior knowledge of firewalls would be helpful but is not required. Most important is a desire and willingness to "get your hands dirty", both setting up your firewall and understanding how to utilize it to protect your home and business.
Cyber-Security Threats, Actors, and Dynamic Mitigation
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT.With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits.Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest. Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.
Millimeter Wave Antennas for 5g Mobile Terminals and Base Stations
This book gives a comprehensive idea of the recent research efforts targeting mmWave 5G mobile terminals and base stations. This is followed by conformal antennas which could be easily integrated onto typical smartphones.
Information Security and Optimization
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools--definitions, usage, and analysis--that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies.Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
A Step Towards Society 5.0
This book serves the need for developing an insight and understanding of the cutting-edge innovation in Cloud technology. It provides an understanding of cutting-edge innovations, paradigms, and security by using real-life applications, case studies, and examples.
Evidence-Based Cybersecurity
The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies "in the wild" have been dismissed in the process of encouraging innovation and marketing. Consequently, governmental organizations, public, and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving performance in a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, review its relevance in the context of existing security tools and policies, and provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals to protect critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers' political, financial, social, and personal experience backgrounds when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings.
Secure Data Management for Online Learning Applications
This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for online learning applications will keep you interested and involved throughout.
AI for Business
Are you tapping into the full potential of artificial intelligence for your business?Discover how ChatGPT and AI can give you the edge in both your personal and professional life.This new book combines the insights and strategies from two bestselling guides into one comprehensive resource, making it easier than ever to unlock the full potential of AI in your life and work.Whether you're curious about how ChatGPT can boost your productivity, spark creativity, or streamline your business operations, this book has you covered. Inside, you'll find: Over 50 practical ways to use ChatGPT to enhance your day-to-day tasks, increase earnings, and tap into new opportunitiesA deep dive into the basics of prompt engineering, with tips and strategies to create effective prompts tailored to your needsClear guidance on integrating AI into your business, from automating routine tasks to revolutionizing customer support and supercharging your e-commerce strategiesInsights on the ethical considerations of AI, ensuring your use of this technology remains responsible and forward-thinkingAnd much more!Whether you're an entrepreneur looking to outsmart the competition, a professional aiming to stay ahead in a changing job market, or simply someone eager to explore the possibilities of AI, this book provides the tools and knowledge you need.
You’ll See This Message When It Is Too Late
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks--financial gain, espionage, and public humiliation of the victims--that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
Computer Security - Esorics 2024
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.
Network Flow Models and Applications
It provides an account of network flows, optimization, network programming and its applications. It contains extensive reference notes, illustrations, tables with various examples. It provides an integrative view of theory, algorithms and applications. This is an excellent book for network flow courses, professionals working with network flow, optimization and network programming.
Computer Security - Esorics 2024
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.
Computer Security - Esorics 2024
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.
Cybersecurity Public Policy
This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy.
Stateless Hash-Based Digital Signature Standard
In an era marked by escalating cyber threats and the looming specter of quantum computing, safeguarding sensitive information is more critical than ever. This FIPS publication, NIST FIPS 205, stands as a critical bulwark in the face of these challenges. It introduces the **Stateless Hash-Based Digital Signature Algorithm (SLH-DSA)**, a cutting-edge digital signature scheme meticulously designed to withstand the threat posed by future quantum computers. This document delves into the intricate mathematical workings of SLH-DSA, providing a comprehensive guide to its key generation, signature generation, and signature verification processes. The publication further outlines 12 approved parameter sets, each offering distinct levels of security strength tailored to different application needs, and elucidating the precise instantiation of various hash functions and pseudorandom functions. This document also examines the intricate components that underpin the SLH-DSA scheme, including the Winternitz One-Time Signature Plus scheme (WOTS+), the eXtended Merkle Signature Scheme (XMSS), the Hypertree, and the Forest of Random Subsets (FORS). For those concerned with the implications of quantum computing on current cryptographic systems, this FIPS publication is a must-read. It offers a deep understanding of SLH-DSA's structure and function, empowering researchers, practitioners, and policymakers to navigate the complexities of post-quantum cryptography and implement this groundbreaking technology to secure our digital future. This annotated edition illustrates the capabilities of the AI Lab for Book-Lovers to add context and ease-of-use to manuscripts. It includes publishing information; abstracts; viewpoints; learning aids; and references.
Data processing.
Data processing is nowadays a fundamental element for everyday life, especially in universities, it can be observed that the core activities have to be based on the success, progress and welfare for all members of the university community.So it can be seen that data processing, storage capacity, information backup and timely delivery of information to the parties involved plays an essential role in today's institutions.
Social Networks
The goal of this book is to provide a reference for applications of mathematical modelling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making. Social Networks: Modelling and Analysis provides the essential knowledge of network analysis applicable to real-world data, with examples from today's most popular social networks such as Facebook, Twitter, Instagram, YouTube, etc. The book provides basic notation and terminology used in social media and its network science. It covers the analysis of statistics for social network analysis such as degree distribution, centrality, clustering coefficient, diameter, and path length. The ranking of the pages using rank algorithms such as Page Rank and HITS are also discussed. Written as a reference this book is for engineering and management students, research scientists, as well as academicians involved in complex networks, mathematical sciences, and marketing research.
Generative AI Application Integration Patterns
Unleash the transformative potential of GenAI with this comprehensive guide that serves as an indispensable roadmap for integrating large language models into real-world applications. Gain invaluable insights into identifying compelling use cases, leveraging state-of-the-art models effectively, deploying these models into your applications at scale, and navigating ethical considerations.Key Features: - Get familiar with the most important tools and concepts used in real scenarios to design GenAI apps- Interact with GenAI models to tailor model behavior to minimize hallucinations- Get acquainted with a variety of strategies and an easy to follow 4 step frameworks for integrating GenAI into applicationsBook Description: Explore the transformative potential of GenAI in the application development lifecycle. Through concrete examples, you will go through the process of ideation and integration, understanding the tradeoffs and the decision points when integrating GenAI.With recent advances in models like Google Gemini, Anthropic Claude, DALL-E and GPT-4o, this timely resource helps readers harness these technologies through proven design patterns.We then delve into the practical applications of GenAI, identifying common use cases and applying design patterns to address real-world challenges. From summarization and metadata extraction to intent classification and question answering, each chapter offers practical examples and blueprints for leveraging GenAI across diverse domains and tasks. Readers will learn how to fine-tune models for specific applications, progressing from basic prompting to sophisticated strategies such as retrieval augmented generation (RAG) and chain of thought.Additionally, the authors provide end-to-end guidance on operationalizing models, including data prep, training, deployment, and monitoring. We also focus on responsible and ethical development. Techniques for transparency, auditing, and governance as crucial design patterns.What You Will Learn: - Concepts of GenAI: pre-training, fine-tuning, prompt engineering, and Retrieval Augmented Generation (RAG)- Framework for integrating AI, entry points, prompt pre-processing, inference, post-processing, and presentation- Patterns for batch and real-time integration- Code samples for metadata extraction, summarization, intent classification, question-answering with RAG, and more- Ethical use: bias mitigation, data privacy, and monitoring- Deployment and hosting options for GenAI modelsWho this book is for: This book is not an introduction to AI/ML or Python. It offers practical guides for designing, building, and deploying GenAI applications in production. While all readers are welcome, those who benefit most include: Developer engineers with foundational tech knowledgeSoftware architects seeking best practices and design patternsProfessionals using ML for data science, research, etc., who want a deeper understanding of Generative AITechnical product managers with a software development backgroundThis concise focus ensures practical, actionable insights for experienced professionalsTable of Contents- Introduction to Generative AI Design Patterns- Identifying Generative AI Use Cases- Designing Patterns for Interacting with Generative AI- Generative AI Batch & Real-time Integration Patterns- Integration Pattern: Batch Metadata Extraction- Integration Pattern: Batch Summarization- Integration Pattern: Real-Time Intent Classification- Integration Pattern: Real-Time Retrieval Augmented Generation- Operationalizing Generative AI Integration Patterns- Embedding Responsible AI into your GenAI Applications
Future Trends in 5G and 6G
This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. Future Trends in 5G and 6G: Challenges, Architecture, and Applications addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future. It provides students, researchers, and practicing engineers with an expert guide to the fundamental concepts, challenges, architecture, applications, and state-of-the-art developments in communication and networking.
Security in IoT
This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.
Interoperability in IoT for Smart Systems
Interoperability in IoT for Smart Systems discusses the different facets of interoperability issues among the IoT devices and their solutions, the scalability issues in an IoT network, and provides solutions for plug-n-play of new devices with the existing IoT system. It also addresses the possible usage of interoperable and plug-n-play IoT networks in different systems to make them smarter. Aimed at researchers and graduate students in computer science, computer engineering, computer networks, electronics engineering, this book Exclusively covers interoperability of IoT systems in parallel with their use towards the development of smart systems Discusses the requirements of interoperability in smart IoT systems and their solutions Reviews IoT applications in different smart and intelligent systems Explores dealing with interoperability of heterogeneous participating devices Provides different case studies and open problems related to interoperability in IoT systems
Augmented Intelligence Toward Smart Vehicular Applications
This up-to-date reference discusses important concepts of vehicular communication in intelligent transportation systems. Augmented Intelligence Toward Smart Vehicular Applications begins by discussing key objectives of intelligent transport systems and vehicular ad-hoc networks (VANETs). It then goes on to discuss challenges, applications and future trends in VANETs. The text focuses on the organization of artificial intelligence (AI) and aspects of deep learning algorithms, particularly multimodal transport. This book will serve as an ideal reference for graduate students and academic researchers in the field of electrical engineering, electronics and communication engineering and transportation engineering.Features In-depth coverage of Internet of Things (IoT) in vehicular applications Discussion on nn-vehicle sensor networks Implementation of mobile IP and migration of IPv6 Focus on the need of AI in smart vehicular applications Discussions on advanced concepts in the field of intelligent transport systems
Multimodal Biometric Systems
This book focuses on fusion in biometric systems. It discusses the present level, the limitations, and proposed methods to improve performance. It describes the fundamental concepts, current research, and security related issues.
Pentesting APIs
Learn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approachKey Features: - Gain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIs- Follow practical advice and best practices for securing APIs against potential threats- Explore essential security topics, potential vulnerabilities, common attack vectors, and the overall API security landscape- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Understanding API security is crucial as APIs form the backbone of modern interconnected applications, making them prime targets for cyberattacks. Drawing on nearly 30 years of cybersecurity experience and an extensive background in network security and forensic analysis, this book provides the knowledge and tools to strengthen your API security practices and protect against cyber threats comprehensively.This book begins by establishing a foundational understanding of APIs, particularly focusing on REST and GraphQL, emphasizing their critical role and potential security vulnerabilities. It guides you through setting up a penetration testing environment to ensure the practical application of concepts. You'll learn reconnaissance techniques, information-gathering strategies, and the discovery of API vulnerabilities. Authentication and authorization testing are thoroughly explored, covering mechanisms, weaknesses, and methods to bypass security controls. By comprehensively addressing these aspects, the book equips you to understand, identify, and mitigate risks, strengthening API security and effectively minimizing potential attack surfaces.By the end of this book, you'll have developed practical skills to identify, exploit, and secure APIs against various vulnerabilities and attacks.What You Will Learn: - Get an introduction to APIs and their relationship with security- Set up an effective pentesting lab for API intrusion- Conduct API reconnaissance and information gathering in the discovery phase- Execute basic attacks such as injection, exception handling, and DoS- Perform advanced attacks, including data exposure and business logic abuse- Benefit from expert security recommendations to protect APIs against attacksWho this book is for: This book is for security engineers, particularly those focused on application security, as well as security analysts, application owners, web developers, pentesters, and all curious enthusiasts who want to learn about APIs, effective testing methods for their robustness, and how to protect them against cyber attacks. Basic knowledge of web development, familiarity with API concepts, and a foundational understanding of cybersecurity principles will help you get started with this book.Table of Contents- Understanding APIs and their Security Landscape- Setting Up the Penetration Testing Environment- API Reconnaissance and Information Gathering- Authentication and Authorization Testing- Injection Attacks and Validation Testing- Error Handling and Exception Testing- Denial of Service and Rate -Limiting Testing- Data Exposure and Sensitive Information Leakage- API Abuse and Business Logic Testing- Secure Coding Practices for APIs
UX for Enterprise ChatGPT Solutions
Create engaging AI experiences by mastering ChatGPT for business and leveraging user interface design practices, research methods, prompt engineering, the feeding lifecycle, and moreKey Features: - Learn in-demand design thinking and user research techniques applicable to all conversational AI platforms- Measure the quality and evaluate ChatGPT from a customer's perspective for optimal user experience- Set up and use your secure private data, documents, and materials to enhance your ChatGPT models- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Many enterprises grapple with new technology, often hopping on the bandwagon only to abandon it when challenges emerge. This book is your guide to seamlessly integrating ChatGPT into enterprise solutions with a UX-centered approach.UX for Enterprise ChatGPT Solutions empowers you to master effective use case design and adapt UX guidelines through an engaging learning experience. Discover how to prepare your content for success by tailoring interactions to match your audience's voice, style, and tone using prompt-engineering and fine-tuning. For UX professionals, this book is the key to anchoring your expertise in this evolving field. Writers, researchers, product managers, and linguists will learn to make insightful design decisions. You'll explore use cases like ChatGPT-powered chat and recommendation engines, while uncovering the AI magic behind the scenes. The book introduces a care and feeding model, enabling you to leverage feedback and monitoring to iterate and refine any Large Language Model solution. Packed with hundreds of tips and tricks, this guide will help you build a continuous improvement cycle suited for AI solutions.By the end, you'll know how to craft powerful, accurate, responsive, and brand-consistent generative AI experiences, revolutionizing your organization's use of ChatGPT.What You Will Learn: - Align with user needs by applying design thinking to tailor ChatGPT to meet customer expectations- Harness user research to enhance chatbots and recommendation engines- Track quality metrics and learn methods to evaluate and monitor ChatGPT's quality and usability- Establish and maintain a uniform style and tone with prompt engineering and fine-tuning- Apply proven heuristics by monitoring and assessing the UX for conversational experiences with trusted methods- Refine continuously by implementing an ongoing process for chatbot care and feedingWho this book is for: This book is for user experience designers, product managers, and product owners of business and enterprise ChatGPT solutions who are interested in learning how to design and implement ChatGPT-4 solutions for enterprise needs. You should have a basic-to-intermediate level of understanding in UI/UX design concepts and fundamental knowledge of ChatGPT-4 and its capabilities.Table of Contents- Recognizing the Power of Design in ChatGPT- Conducting Effective User Research- Identifying Optimal Use Cases for ChatGPT- Scoring Stories- Defining the Desired Experience- Gathering Data - Content is King- Prompt Engineering- Fine-Tuning- Guidelines and Heuristics- Monitoring and Evaluation- Process- Conclusion